LinkedIn Faces Cookie Vulnerabilities

  /     /     /  
Publicated : 22/11/2024   Category : security


LinkedIn Faces Cookie Vulnerabilities


The social networking site is set to reduce the length of time before cookies expire and add HTTPS across its site.



(click image for larger view)
Slideshow: How Firesheep Can Hijack WebSessions
LinkedIn users accounts are vulnerable to hijacking, due to the manner in which the social networking site handles its website cookies.
That security warning comes from Rishi Narang, a security consultant at website scanning firm Hackers Locked, who published an
analysis of the vulnerability
on Saturday.
LinkedIn is much in the news lately, owing to its initial public offering on Thursday, which by the close of the day resulted in the company being
valued at $8.9 billion
. But is the company paying enough attention to the security of its users?
LinkedIn, like many websites, uses
cookies
to store, on a PC, session information relating to anyone who uses that PC to access LinkedIn. Such cookies make it easy for users to later access LinkedIn without having to enter a username or password. But according to Narang, LinkedIn needs to handle its cookies better.
All told, there are two cookie-related vulnerabilities, he said. The first stems from LinkedIn SSL cookies not using a secure flag, which means that session credentials are sent in plaintext. As a result, theyre susceptible to a man-in-the-middle attack, which could intercept these credentials. Such an attack could be launched from a third-party website by remotely redirecting a user to the HTTPS log-in page for LinkedIn, and watching the relevant credentials being passed back and forth.
A fix, however, is relatively simple: LinkedIn should use the secure flag on any cookies that are used with an HTTPS page, such as the log-in page, said Narang. If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic, he said. If the secure flag is not set, then the cookie will be transmitted in clear text if the user visits any HTTP URLs within the cookies scope. Another security improvement would be for LinkedIn to restrict credentials to a specific IP address, as Gmail does. That way, if an attacker stole a credential and attempted to use it from another PC, it wouldnt work.
The second vulnerability, he said, is due to LinkedIn setting its cookies to not expire for one year--an eternity, in website time--and not canceling cookies if a user logs out. As a result of valid cookies, an attacker can sniff the cookies from [a] clear-text session, as detailed with the prior vulnerability, said Narang. With cookies in hand, an attacker could then authenticate as the other user. He can then compromise and modify the information available at the user profile page, he said.
Accordingly, this vulnerability rates largely as a nuisance, since LinkedIn doesnt store peoples financial information. On the other hand, in the wrong hands, a LinkedIn account hijacking or defacement could be quite embarrassing. Furthermore, intercepting peoples LinkedIn credentials is relatively easy--if theyre using an unsecured, public Wi-Fi hotspot--by using a tool such as
Firesheep
.
LinkedIn said its working on related improvements, but in the short term, recommended users avoid unsecured networks. Whether you are on LinkedIn or any other site, its always a good idea to choose trusted and encrypted Wi-Fi networks or VPNs whenever possible, said a LinkedIn spokesperson via email. If one isnt available, we already support SSL for logins and other sensitive Web pages.
Going forward, he said, LinkedIn plans to support SSL--as in, HTTPS pages--across the entire site.
As with Facebook
, users will need to opt in. Furthermore, we are going to reduce the lifespan of the cookies in question from 12 months to 90 days, said the spokesperson.
LinkedIn takes the privacy and security of our members seriously, while also looking to deliver a great site experience, and we believe these two changes will allow us to strike that balance, he said.
In this new Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk.
Download it here
(registration required).

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
LinkedIn Faces Cookie Vulnerabilities