Campaign Account Balance and History Disclosed in API Response
Medium
L
LinkedIn
Submitted None
Actions:
Reported by
sachin_kr
Vulnerability Details
Technical details and impact analysis
During the security assessment of the application, it has been observed that server-side authorization checks are not implemented on the 'GET /campaign-manager-api/campaignManagerAccounts/:campaignId/accountCredits?q=account' HTTP request. As a result, an attacker can fetch the campaign wallet amount details like 'totalCreditAmount', and 'remaining credit amount' history of all the victim's account.
###Steps to reproduce:
1. Log in to LinkedIn.
2. Create an advertising account.
███
3. After creating the account go to - the https://www.linkedin.com/campaignmanager/accounts/XXXXX/billing/transactions page.
4. Intercept the vulnerable requests and replay the request using the victim's campaign id. The response will disclose the campaign wallet details and history.
███████
###Vulnerable Request:
```
GET /campaign-manager-api/campaignManagerAccounts/█████████████/accountCredits?q=account HTTP/2
Host: www.linkedin.com
```
###IDs for testing:
███████████████████
████████████
█████████████████
█████████████████
The ids are in series so can be brute forced
## Impact
An attacker can access the complete wallet details like available amount and used amounts and the deposit history of victim's campaign account.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Insecure Direct Object Reference (IDOR)