Loading HuntDB...

Campaign Account Balance and History Disclosed in API Response

Medium
L
LinkedIn
Submitted None
Reported by sachin_kr

Vulnerability Details

Technical details and impact analysis

Insecure Direct Object Reference (IDOR)
During the security assessment of the application, it has been observed that server-side authorization checks are not implemented on the 'GET /campaign-manager-api/campaignManagerAccounts/:campaignId/accountCredits?q=account' HTTP request. As a result, an attacker can fetch the campaign wallet amount details like 'totalCreditAmount', and 'remaining credit amount' history of all the victim's account. ###Steps to reproduce: 1. Log in to LinkedIn. 2. Create an advertising account. ███ 3. After creating the account go to - the https://www.linkedin.com/campaignmanager/accounts/XXXXX/billing/transactions page. 4. Intercept the vulnerable requests and replay the request using the victim's campaign id. The response will disclose the campaign wallet details and history. ███████ ###Vulnerable Request: ``` GET /campaign-manager-api/campaignManagerAccounts/█████████████/accountCredits?q=account HTTP/2 Host: www.linkedin.com ``` ###IDs for testing: ███████████████████ ████████████ █████████████████ █████████████████ The ids are in series so can be brute forced ## Impact An attacker can access the complete wallet details like available amount and used amounts and the deposit history of victim's campaign account.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Insecure Direct Object Reference (IDOR)