LinkendIn’s auto-fill plugin reportedly leaked user data

Costea Lestoc By: Costea Lestoc
2 minute read
linkedin security issues

Home » News » LinkendIn’s auto-fill plugin reportedly leaked user data

Microsoft purchased LinkedIn back in 2016 and until now there haven’t been any problems with the service. You might have found the LinkedIn AutoFill plugin useful, but it seems that there’s more to it than meets the eye. The plugin is vulnerable to leaking member data such as name, email address, location, phone number and users’ workplaces if the sire that is using this feature is susceptible to cross-site scripting exploits.

LinkedIn limits this feature to some websites

The feature is only limited to a small number of approved websites. ZDNet reported that at least one of these websites was found vulnerable to the exploit and it allows security research Jack Cable to exfiltrate LinkedIn user profile data just when a user clicked on the webpage of the site.

Cable stated that user data could be exposed to any website just if you click somewhere on that page and this is triggered by the fact that the AutoFill button can be invisible, spanning the whole page.

User data can be exposed regardless of privacy settings

Unfortunately, it doesn’t even matter how your privacy settings are configured because your information could still be exposed.

For instance, if I set my privacy settings to not display my last name or email address and display a general location, this still returns my full name, email address, and zip code.

Cable revealed the sad news of the exploit’s existence after LinkedIn failed to fix the flaw and shut down communication with Cable.


In case you want to be secure while surfing the internet, you will need to get a full-dedicated tool to secure your network.  Install now Cyberghost VPN and secure yourself. It protects your PC from attacks while browsing, masks your IP address and blocks all unwanted access.


Eventually, LinkedIn managed to fix the exploit

LinkedIn found and fixed the problem and also addressed it. Here’s what they said:

We immediately prevented unauthorized use of this feature, once we were made aware of the issue. While we’ve seen no signs of abuse, we’re constantly working to ensure our members’ data stays protected. We appreciate the researcher responsibly reporting this, and our security team will continue to stay in touch with them.

For more information on how to keep your personal data private while online, check out the guides listed below:

Discussions

Next up

Windows was unable to install your Android [FIX IT NOW]

Aleksandar Ognjanovic By: Aleksandar Ognjanovic
4 minute read

Installing Android drivers on a PC should be a walk in a park. You connect your handset with the PC via the USB cable and, […]

Continue Reading

5 ways to fix NOX emulator lag issues that really work

Daniel Segun By: Daniel Segun
6 minute read

Do you have NOX installed on your PC? Are you experiencing any form of lag while running it? This article is specially designed for you! […]

Continue Reading

What to do if ExpressVPN won’t connect after update

Daniel Segun By: Daniel Segun
6 minute read

Do you have ExpressVPN installed on your PC? Do you encounter connection problems after an update? This guide will help you out. Here, we’ll be […]

Continue Reading