this post was submitted on 10 Jul 2023
174 points (97.8% liked)

Lemmy.ca's Main Community

2809 readers
2 users here now

Welcome to lemmy.ca's c/main!

Since everyone on lemmy.ca gets subscribed here, this is the place to chat about the goings on at lemmy.ca, support-type items, suggestions, etc.

Announcements can be found at https://lemmy.ca/c/meta

For support related to this instance, use https://lemmy.ca/c/lemmy_ca_support

founded 3 years ago
MODERATORS
 

cross-posted from: https://sh.itjust.works/post/923025

lemmy.world is a victim of an XSS attack right now and the hacker simply injected a JavaScript redirection into the sidebar.

It appears the Lemmy backend does not escape HTML in the main sidebar. Not sure if this is also true for community sidebars.

top 34 comments
sorted by: hot top controversial new old
[–] [email protected] 32 points 1 year ago* (last edited 1 year ago) (2 children)

This has nothing to do with XSS, it is a simple HTML injection vulnerability, and it can only be exploited by instance admins.

Also Lemmy.world appears to have been running a custom frontend so it’s hard to say how widespread the affects of this are.

[–] [email protected] 9 points 1 year ago

You seem to be following the situation closely. Could you please DM me on Matrix?

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

Worst case scenario, they can steal your Lemmy session, right?

Which isn't super bad for a service like Lemmy. This isn't a social network, so most contact list scams would be useless.

Edit: just read the targets were admins. That IS bad.

[–] [email protected] 3 points 1 year ago (1 children)

Lemmy isn't a social network? Seems to be one to me.

[–] [email protected] 3 points 1 year ago

I mean, not in the traditional sense. You don't have your family and friends as Lemmy contacts and share posts with them. It's more anonymous.

[–] [email protected] 15 points 1 year ago

It seems to have just gotten to Lemmy.blahaj.zone

[–] [email protected] 12 points 1 year ago (1 children)

I wonder if there is something the Lemmy.ca admins can do to disable the sidebar or put a workaround in to prevent this.

[–] [email protected] 37 points 1 year ago (2 children)

At this point I'm monitoring inter-instance communications channels non stop even though I should be in bed. I will be temporarily removing admins that have not responded to my inquiry to confirm if they have 2FA authentication turned on as initial access appears to have been gained due to lack of 2FA.

If there's anything additinal we can do, we will.

[–] [email protected] 6 points 1 year ago (1 children)

Good luck, and thanks for all your hard work. I don't know if you already saw this, but it looks like this might be the vector for the account compromise. If that's the case, I don't think 2FA is enough to protect, because it's exfiltrating the session cookies of someone already logged in. Seems like the precaution is for admins to avoid clicking any suspicious links. I realize the irony of sharing a link about this, but at least it's to a thread on this instance.

https://lemmy.ca/post/1311411

[–] [email protected] 8 points 1 year ago

I'm copying all links into a brand new incognito mode window for now.

[–] [email protected] 2 points 1 year ago (1 children)

Introduce minimum password complexity if there's a config option for it and force admins to reset passwords.

[–] [email protected] 4 points 1 year ago (1 children)

There's no minimum complexity but I've enforced 2FA for all admins. One admin that did not respond has been temporarily removed precautionarily.

[–] [email protected] 3 points 1 year ago (1 children)

thanks for your hard work, even though i am sure you're tired as hell. i think that person's idea about a minimum complexity requirement in addition to 2FA is a good idea, perhaps something like a complex password generator like LastPass or something, anything.

[–] [email protected] 8 points 1 year ago* (last edited 1 year ago) (1 children)

We can put it in place as a internal policy. I'm 99% confident all admins on Lemmy.ca are using complex password generators, that are hopefully not LastPass with their history of being hacked 😅

Edit: yeah I'm tired. It's like 3 hours post bed time. I'm supposed to be at work in just over 5 hours.

[–] [email protected] 4 points 1 year ago

I’m supposed to be at work in just over 5 hours.

shit that sucks. this happened at a bad time, i'm sorry. are their people besides you who are keeping an eye on this and maintaining it, for when you go off to work or when you need to sleep? cause everyone needs their sleep

[–] [email protected] 7 points 1 year ago (1 children)

I mean, if it's something that's editable only by admins of the instance, I'm not sure it constitutes a vulnerability, since admins can change the content to whatever they desire by definition.

[–] [email protected] 5 points 1 year ago (1 children)

Wasn’t clear till further people commented that it was something only and admin could do. So I agree.

[–] [email protected] 6 points 1 year ago (1 children)

We have yet to confirm if a vulnerability exists in the sidebars that can be set by community mods.

[–] [email protected] 2 points 1 year ago (2 children)

can you temporally take away the ability for mods to put html or any kinda script into the sidebar, at least for now?

[–] [email protected] 3 points 1 year ago

No. Unfortunately. This is not a confirmed vector of attack at this point but we are monitoring.

[–] [email protected] 2 points 1 year ago (1 children)

That would essentially be patching the vulnerability. A temporary fix would be just preventing the sidebar from being editable.

(Ideally the vulnerability would be patched, but these things take time.)

[–] [email protected] 5 points 1 year ago (1 children)

At this point it doesn't seem like community sidebars have the voulnerabilty. We are fairly confident that they have identified the voulnerabilty and that lemmy.ca is safe as long as our admin accounts are properly locked down which we have confirmed.

[–] [email protected] 1 points 1 year ago

Oh, good! That's excellent then.

[–] [email protected] 5 points 1 year ago (2 children)

So, as an average, less-technical, Lemmy user (this is my backup for now).
What can or should I do to stay safe?

[–] [email protected] 5 points 1 year ago

https://lemmy.world/post/1290412?scrollToComments=true

The affected instances are coming back and the vulnerability being mitigated. Apparently no personal data was compromised. So you should be fine.

[–] [email protected] 4 points 1 year ago

Id use an app you trust for now

On a site you have to sanitize your data, on a native app you'd have to go out of your way to render this kind of thing...wefwef/voyager is actually a web page (and they might or might not be sanitizing their inputs), the other top options are probably using libraries to do it, and data sanitation is pretty basic. Literally web dev 101. They'd have to choose a very full-featured rendering library that also entirely ignores security, or they'd have to have rolled their own

At least now I know why my renderer has been so annoying about the warnings the last couple days...

For any devs that read this - this is a great example of why you can't trust anything coming off a federated network. Type check and sanitize all your inputs, always. We need to get away from trust - this isn't a trustful situation

Luckily, this was more of a warning than an actual attack - and there will be actual attacks. We have to be defensive - always - every time at every level.

And Flemmy will be that, once I feel good releasing it (2 features left before I'm out of reasons to procrastinate). It'll be just me, always

[–] [email protected] 2 points 1 year ago (1 children)

Beehaw completely shut down as a response

[–] [email protected] 5 points 1 year ago

While I respect their decision, I believe that's a over-reaction at this point and we will not be doing that, yet.

load more comments
view more: next ›