============================================= INTERNET SECURITY AUDITORS ALERT 2012-003 - Original release date: 16th December 2012 - Last revised: 26th September 2013 - Discovered by: Eduardo Garcia Melia - Severity: 6.8/10 (CVSS Base Scored) ============================================= I. VULNERABILITY ------------------------- LinkedIn social network is affected by Multiple Reflected Cross-Site Scripting vulnerabilities. II. BACKGROUND ------------------------- LinkedIn is a social networking service and website(http://www.linkedin.com/) operates the world's largest professional network on the Internet with more than 187 million members in over 200 countries and territories. More Information: http://press.linkedin.com/about III. DESCRIPTION ------------------------- LinkedIn social network is affected by Multiple reflected Cross-Site Scripting vulnerabilities. An attacker can inject HTML or script code in the context of victim's browser, so can perform XSS attacks, and steal cookies of a targeted user. The affected resource is http://www.linkedin.com/home?trk=guest_home. IV. PROOF OF CONCEPT ------------------------- ============================= First XSS -> Corrected ============================= You can go to LinkedIn Home -> Shared an Update -> Attach Link. After attack link, you should edit this link, and put in the Title and Description field, the XSS injection, for example: +

XSS TEST

+ Finally, you should pulse "Preview" button, and then show you the injection. The vulnerability is in this code:

XSSINJECTION

URLTITLE

Edit

============================= Second XSS ============================= You can go to LinkedIn Groups -> Groups you may like, and find some open group, for example "Test Analyst / Test Lead / Test Manager Networking". After, you can start Discussion, and put on the fields "Test" and "test" value and pulse "share" button. When the discussion is shared, show you "Your post has been submitted for review. You can view it here.", if you go to "here" link, you can edit your post and put, for example, this code: +