cross-posted from: https://lemmy.ml/post/1895271

FYI!!! In case you start getting re-directed to porn sites.

Maybe the admin got hacked?


edit: lemmy.blahaj.zone has also been hacked. beehaw.org is also down, possibly intentionally by their admins until the issue is fixed.

Post discussing the point of vulnerability: https://lemmy.ml/post/1896249

  • cole@lemdro.id
    shield
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    edit-2
    1 year ago

    Hey everyone, this exploit is present in the custom emoji feature of Lemmy. Because lemdro.id does not use custom emojis, we are not vulnerable at this time.

  • alaxitoo@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    Swear this is the same guy that did the trending community spam a few days ago, he was angry about being banned for squatting on known subreddit names here on Lemmy, even the compromised admin account said something about it in her comments before this happened 🤦‍♂️

    • bdonvr@thelemmy.club
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      Time to move from banning to contacting authorities then… spam is one thing. This is criminal.

    • Nepenthe@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      Wait, was that the one that had a community list well into the twenties? Or was that someone else? I don’t think all that stuff reached me, but I did hear about a wannabe powermod like a week and a half ago. Much good that does anyone in a defederated system.

      • alaxitoo@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        1 year ago

        His username at the time was “LMAO” and I think so… he did it again on another Lemmy instance but used a different username that time as well 😂

  • TheSaneWriter@lemm.ee
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Deeply unfortunate that something like this could happen, you always hope that code injection vulnerabilities are found before someone is hacked. With that in mind, this shows the importance of two security principles: always parse and clean user input and don’t click links (including images) before checking where they are going to send you.

    • db2@lemmy.one
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      This used an onLoad which isn’t generally shown when you hover over a link in a browser. Most people, even devs, aren’t going to jump on the console to check every link.

      NoScript would probably have helped though.

  • darrsil@lemdro.id
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 year ago

    Did this result in Lemmy.world being defederated from Lemdro.id?

    Lemmy.world is back up and the hack is over, but when I view !android@lemdro.id using my lemmy.world account I can’t see anything.

    EDIT: In case anyone else is having this problem, the issue was my language settings. Despite having “Undetermined” set as a language, that was the problem - I clicked the little “X” to unselect all languages and then saved, and now it’s working again.

    • T156@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      If they changed their server token, which they would have done to reduce the chances of the hackers reusing the same account tokens, you need to refresh your browser cache/cookies.

      On desktop, you can do this by hitting CTRL-SHIFT-R, and on mobile, you probably just have to sign out and sign back in again.

  • Aer@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    1 year ago

    Some information I have posted to Lemmy.World:

    I am not a super code-literate person so bare with me on this… But. Still please becareful. There appears to be a vulnerability.

    Users are posting images like the following:

    https://imgur.com/a/RS4iAeI

    And inside hidden is JavaScript code that when executed can take cookie information and send it to a URL address.

    Among other things. At this time if you see an image please click the icon circled before clicking the link. DO NOT CLICK THE IMAGE. If you see anything suspicious, please report it immediately. It is better a false report than a missed one.

    I have seen multiple posts by these people during the attack. It is most certainly related to JS.

    • TheFrirish@jlai.lu
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      lmao I’m so stupid I pressed on that image and now my account is compromised. oh well it forced to create another and this is my first hack yayyyyy!

      • Fal@yiffit.net
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        1 year ago

        There’s so many things wrong with this I don’t even know where to start

    • Hairypooper@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      Wtf how is this even possible? Are the Lemmy devs smoking crack? If you’re going to run a reddit alternative, it may be wise to sanitize the fuck out of everything posted on there.

        • waltuh@feddit.uk
          link
          fedilink
          English
          arrow-up
          0
          arrow-down
          1
          ·
          1 year ago

          Not really helpful though is it? It’s like going to a friend’s house and asking why there is a sink hole in the middle of the floor that everyone is walking around, and they say “feel free get a hammer out”.

          • lowleveldata@programming.dev
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            It’s more like when everyone is looking at the previously unknown hole and discussing how to patch it up and you start yelling how it is unacceptable as your friend’s house is a “bar alternative”

  • Banana@kbin.social
    link
    fedilink
    arrow-up
    1
    arrow-down
    2
    ·
    1 year ago

    In all seriousness, no one is talking about this, but this is the one disadvantage of open source software being developed by volunteers, we don’t know exactly how the admin accounts were hacked but the XSS stuff is really basic stuff, none of those fields were sanatised at all, and it makes me concerned what else has been missed, obviously the advantage of open source is in time this stuff can get fixed, but this is what happens when loads of people who aren’t experts contribute to a site.

    In comparison to sites where there is a fully hired developer team the quality of the code is significantly better. I really hope the passwords were hashed on these instances and the hackers didn’t get plain text passwords or anything really bad like this.

    One thing and credit to Ernest, as I’ve contributed there he does very thorough code reviews and his quality of code is very good, its why im confident kbin won’t be hacked.

    • Fal@yiffit.net
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      1 year ago

      I think you’ve never worked in software, or even used software, if you think paid close source apps don’t have issues like this. They can be worse because they’re written by interns and no one there actually cares, they just want their paycheck

      • Avid Amoeba@lemmy.ca
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        1 year ago

        I concur that the security behind closed doors I’ve seen is often non-existent. The incentives are typically stacked against security.

    • PupBiru@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      yes and no: there are a couple of schools of thought!

      of course, code by a lot of people without proper review is… risky

      however, at least it’s able to be reviewed! and in time and with enough eyeballs, hopefully that code will become far more robust. that’s the benefit of transparency: anyone can review any line at any time!

      remember: closed-source code as plenty of vulnerabilities too! just if we can’t review it, it’s much harder to work out what they might be… often, closed source vulnerabilities can exist for years without the vendor ever patching them because nobody is calling them out on it… hell, they can even know that their software is actively being exploited and just… not tell anyone

  • mutant@kbin.social
    link
    fedilink
    arrow-up
    0
    arrow-down
    4
    ·
    1 year ago

    I think it’s hilarious that Reddit protesters were redirected to NSFW content, karma is coming around lmfao

    • XiELEd@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      What karma? Spez started it by being a liar 🤷‍♂️ so I say it is natural that people stop supporting him.

      • thayer@lemmy.ca
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        Dude’s got 44 comments and every single one is a complaint about the reddit protest or protestors. Might just be spez himself lol