this post was submitted on 10 Jul 2023
9 points (90.9% liked)

Lemmy.ca's Main Community

2805 readers
1 users here now

Welcome to lemmy.ca's c/main!

Since everyone on lemmy.ca gets subscribed here, this is the place to chat about the goings on at lemmy.ca, support-type items, suggestions, etc.

Announcements can be found at https://lemmy.ca/c/meta

For support related to this instance, use https://lemmy.ca/c/lemmy_ca_support

founded 3 years ago
MODERATORS
 

cross-posted from: https://sh.itjust.works/post/923025

lemmy.world is a victim of an XSS attack right now and the hacker simply injected a JavaScript redirection into the sidebar.

It appears the Lemmy backend does not escape HTML in the main sidebar. Not sure if this is also true for community sidebars.

top 14 comments
sorted by: hot top controversial new old
[–] Gamingodcat@2dl.eu 3 points 1 year ago* (last edited 1 year ago) (2 children)

This has nothing to do with XSS, it is a simple HTML injection vulnerability, and it can only be exploited by instance admins.

Also Lemmy.world appears to have been running a custom frontend so it’s hard to say how widespread the affects of this are.

[–] TruckBC@lemmy.ca 1 points 1 year ago

You seem to be following the situation closely. Could you please DM me on Matrix?

[–] pazukaza@lemmy.ml 0 points 1 year ago* (last edited 1 year ago) (1 children)

Worst case scenario, they can steal your Lemmy session, right?

Which isn't super bad for a service like Lemmy. This isn't a social network, so most contact list scams would be useless.

Edit: just read the targets were admins. That IS bad.

[–] Auli@lemmy.ca 1 points 1 year ago (1 children)

Lemmy isn't a social network? Seems to be one to me.

[–] pazukaza@lemmy.ml 2 points 1 year ago

I mean, not in the traditional sense. You don't have your family and friends as Lemmy contacts and share posts with them. It's more anonymous.

[–] AlternateRoute@lemmy.ca 2 points 1 year ago (1 children)

I wonder if there is something the Lemmy.ca admins can do to disable the sidebar or put a workaround in to prevent this.

[–] TruckBC@lemmy.ca 3 points 1 year ago (1 children)

At this point I'm monitoring inter-instance communications channels non stop even though I should be in bed. I will be temporarily removing admins that have not responded to my inquiry to confirm if they have 2FA authentication turned on as initial access appears to have been gained due to lack of 2FA.

If there's anything additinal we can do, we will.

[–] avidamoeba@lemmy.ca 0 points 1 year ago (1 children)

Introduce minimum password complexity if there's a config option for it and force admins to reset passwords.

[–] TruckBC@lemmy.ca 0 points 1 year ago (1 children)

There's no minimum complexity but I've enforced 2FA for all admins. One admin that did not respond has been temporarily removed precautionarily.

[–] minnieo@kbin.social 0 points 1 year ago (1 children)

thanks for your hard work, even though i am sure you're tired as hell. i think that person's idea about a minimum complexity requirement in addition to 2FA is a good idea, perhaps something like a complex password generator like LastPass or something, anything.

[–] TruckBC@lemmy.ca 3 points 1 year ago* (last edited 1 year ago) (1 children)

We can put it in place as a internal policy. I'm 99% confident all admins on Lemmy.ca are using complex password generators, that are hopefully not LastPass with their history of being hacked 😅

Edit: yeah I'm tired. It's like 3 hours post bed time. I'm supposed to be at work in just over 5 hours.

[–] minnieo@kbin.social 2 points 1 year ago

I’m supposed to be at work in just over 5 hours.

shit that sucks. this happened at a bad time, i'm sorry. are their people besides you who are keeping an eye on this and maintaining it, for when you go off to work or when you need to sleep? cause everyone needs their sleep

[–] frankyboi@lemmy.ca 1 points 1 year ago

for some reason I had to reset my password.

load more comments
view more: next ›