this post was submitted on 10 Jul 2023
476 points (99.2% liked)

Fediverse

17724 readers
95 users here now

A community dedicated to fediverse news and discussion.

Fediverse is a portmanteau of "federation" and "universe".

Getting started on Fediverse;

founded 5 years ago
MODERATORS
 

FYI!!! In case you start getting re-directed to porn sites.

Maybe the admin got hacked?


edit: lemmy.blahaj.zone has also been hacked. beehaw.org is also down, possibly intentionally by their admins until the issue is fixed.

Post discussing the point of vulnerability: https://lemmy.ml/post/1896249

Github Issue created here: https://github.com/LemmyNet/lemmy-ui/issues/1895

top 50 comments
sorted by: hot top controversial new old
[–] Candelestine@lemmy.ca 90 points 1 year ago (7 children)

Yea, I switched to this alt. It appears to be one of the assistant admins accts. Seems like an old fashioned anon prank, to me, they're mainly just trying to make stuff offensive and redirect people to lemonparty.

So, y'know, old school.

I don't know if any data is actually in danger, but I doubt it. I don't see why assistant admins would need access to it.

[–] hawkwind@lemmy.management 48 points 1 year ago (4 children)

All the bean memes are in danger! On a serious note, old-skool or not, it's a huge loss of trust in something the community-at-large is excited to see replace reddit.

[–] Candelestine@lemmy.ca 67 points 1 year ago (2 children)

Par for the course. This system will never be immune to things like that. That's part of what happens when you decentralize your power. Instead of a single target that can be made highly secure, you have a distributed array of targets.

People should certainly be engaging on here with full awareness of the reality of the Fediverse, not expecting reddit 2.0. We never will be able to offer exactly what they did. We'll be naturally worse in some areas and naturally better in others.

[–] Philolurker@lemm.ee 21 points 1 year ago (5 children)

This is why I'm glad I made redundant accounts on multiple instances. When there are problems on lemmy.world, I can just hop on over to another. That's never been an option with Reddit.

Now if there was only a way to export or sync user settings like subscriptions, it would be perfect.

load more comments (5 replies)
load more comments (1 replies)
[–] Menachem@midwest.social 25 points 1 year ago (2 children)

idk, im surprised it took this long. there's a huge variety of admin teams with varying degrees of security awareness and it's been over a month since the first big influx of users started. it'll happen again too and probably not before too long

load more comments (2 replies)
[–] henfredemars@infosec.pub 18 points 1 year ago (3 children)

On the other hand, look at where we are. This is proof that one hack can't take down Lemmy.

load more comments (3 replies)
load more comments (1 replies)
[–] CMahaff@lemmy.ml 30 points 1 year ago* (last edited 1 year ago) (3 children)

My concern is that configuring the site to automatically redirect users sounds like they have pretty large control over the site - the kind of control that I would assume is usually limited to users with root access on the server.

Obviously hope nothing of value is lost and that there is a proper off-site backup of the content.

Edit: See Max-P's comment, it looks like the site redirection was accomplished in a way that IMO suggests they do NOT have full control over the site. We'll obviously have to wait for the full debrief from the admins.

load more comments (3 replies)
load more comments (5 replies)
[–] TheGreatFox@lemmy.dbzer0.com 82 points 1 year ago

Main instance hacked? Time to use an alt!

The first hack is a rite of passage for every site that gets big. It means we've been recognized!

Luckily, this seems to be a standard troll (with some tech knowledge) - they've defaced the site and put redirects to shock sites, rather than injecting actual malware or quietly collecting everyone's passwords. This could be much worse.

[–] Max_P@lemmy.max-p.me 76 points 1 year ago (11 children)

I tried to reproduce the exploit on my own instance and it appears that the official Docker for 0.18.1 is not vulnerable to it.

It appears that the malicious code was injected as an onload property in the markdown for taglines. I tried to reproduce in taglines, instance info, in a post with no luck: it always gets escaped properly in the <img alt="exploit here"> property as HTML entity.

lemmy.world appears to be running a git commit that is not public.

[–] CMahaff@lemmy.ml 39 points 1 year ago (1 children)

I actually consider it good news that the redirection is happening this way (something that can be done just by having the lemmy credentials of an admin) vs something indicating they have access to the server itself.

[–] maegul@lemmy.ml 29 points 1 year ago (6 children)

Yep, same. It was also the most likely scenario.

It looks like it was an individual admin getting hacked. Not good but not the worst. Most fallout will probably be whether their security practices were sufficient for an admin and whether lemmy has good enough contingencies for this sort of thing. Lemmy’s 2FA is probably a hot issue now though.

[–] RoundSparrow@lemmy.ml 16 points 1 year ago (7 children)

The JWT are likely a hot issue, already some Issues on GitHub about them not being revoked properly.

load more comments (7 replies)
load more comments (5 replies)
load more comments (10 replies)
[–] bigben111@lemmy.ml 61 points 1 year ago (2 children)

How did it happen and what does this mean for me as a user of lemmy.ml who also follows people on lemmy.world?

[–] Stovetop@lemmy.ml 75 points 1 year ago (4 children)

One of the admin accounts appears to have been compromised. The owner/other admins appear to be aware now because that account had its admin access revoked and offending posts are being removed.

Definitely opens up a big question about the security of Lemmy instances that I am sure will be discussed over the next few days.

[–] hawkwind@lemmy.management 30 points 1 year ago (3 children)

I wouldn't assume reasons why or that it's fixed until that consensus has been more widely reached.

load more comments (3 replies)
[–] eerongal@ttrpg.network 17 points 1 year ago (14 children)

Definitely opens up a big question about the security of Lemmy instances that I am sure will be discussed over the next few days.

They added 2FA login to lemmy in one of the newer updates. Probably pretty pertinent for any admins to use it....

load more comments (14 replies)
load more comments (2 replies)
[–] Max_P@lemmy.max-p.me 22 points 1 year ago (1 children)

Not a whole lot - you might see some spam being federated from lemmy.world but I'd expect the lemmy.ml and lemmy.world admins will fix it, and them clean it up.

That's probably good stress test to figure out how to handle that.

load more comments (1 replies)
[–] 001100010010@lemmy.dbzer0.com 54 points 1 year ago (1 children)

God damn, spez-funded hacker groups already is trying to disrupt the resistance.

[–] bdawg923@lemmy.ml 16 points 1 year ago (1 children)
load more comments (1 replies)
[–] maegul@lemmy.ml 48 points 1 year ago* (last edited 1 year ago) (4 children)

Hmmm. Don’t know what the fall out of this will be. But a lot of lemmy is on that server. Unfortunately. Maybe we’ll learn a lesson in the value of decentralisation.

Ruud also runs mastodon.world, FYI.

[–] Lemon@lemmy.blahaj.zone 20 points 1 year ago

This is why it makes sense for communities to not all pile into one instance, it gives one instance admin too much power and responsibility over everything.

load more comments (3 replies)
[–] delendum@lemdit.com 48 points 1 year ago (6 children)

lemmy.world was briefly back to normal and there had been a post saying that everything was fine now - it's not.

The site has just started doing the same thing again.

Please do not try using lemmy.world for the time being.

[–] Cube6392@beehaw.org 24 points 1 year ago (3 children)

the post saying everything was fine now was coming from the same account that was originally compromised

load more comments (3 replies)
load more comments (5 replies)
[–] upt@lemmy.ml 45 points 1 year ago (1 children)

Being a part of Lemmy in these early days has been kind of interesting, seeing all of the bugs and bits that will be ironed out over time. One day when Lemmy is as old as Reddit it will all be folklore. Maybe.

[–] Candelestine@lemmy.ca 18 points 1 year ago

This'll definitely be remembered. It's good for us, we needed the wakeup call.

[–] Max_P@lemmy.max-p.me 41 points 1 year ago (6 children)

GitHub PR fixing the bug: https://github.com/LemmyNet/lemmy-ui/pull/1897/files

If your instance has custom emojis defined, this is exploitable everywhere Markdown is available. It is NOT restricted to admins, but can be used to steal an admin's JWT, which then lets the attacker get into that admin's account which can then spread the exploit further by putting it somewhere where it's rendered on every single page and then deface the site.

If your instance doesn't have any custom emojis, you are safe, the exploit requires custom emojis to trigger the bad code branch.

load more comments (6 replies)
[–] bootyberrypancakes@lemmywinks.xyz 36 points 1 year ago* (last edited 1 year ago) (5 children)

lemmy.blahaj.zone got hacked too, looks like the same people

https://lemmywinks.xyz/post/320087

[–] james@lurk.fun 27 points 1 year ago

They also changed the allowed/blocked instances to allow threads.net and defederate lemmy.ml, just like they did on lemmy.world: https://lemmy.blahaj.zone/instances

[–] Candelestine@lemmy.ca 19 points 1 year ago (1 children)

Huh... so this probably is more sophisticated than a single acct breach then. Lovely.

[–] bootyberrypancakes@lemmywinks.xyz 16 points 1 year ago (1 children)

Yeah, I'd recommend any server admin that doesn't have 2FA turn it on ASAP until we know what their exploiting

load more comments (1 replies)
load more comments (3 replies)
[–] RoundSparrow@lemmy.ml 32 points 1 year ago (5 children)
[–] G59@lemmy.ml 25 points 1 year ago

we did it Reddit! /s

[–] luthis@lemmy.nz 16 points 1 year ago

I saw this and laughed. Yes, that's definitely how copyright works.

load more comments (3 replies)
[–] CMahaff@lemmy.ml 24 points 1 year ago

4AM in the Netherlands where the instance owner Ruud lives... hopefully his assistant admins can clean it up, but it might be a bit before he even knows anything is wrong.

[–] RunAwayFrog@sh.itjust.works 22 points 1 year ago

Don't know if this will be relevant at all, but I'm almost hoping this will force Lemmy devs to abandon the obscure markdown crate they use for pulldown-cmark.

Using an obscure markdown implementation just because it supports spoiler tags always sounded like a silly decision to me!

[–] Max_P@lemmy.max-p.me 19 points 1 year ago

The admins now appears to have taken down the backend in an effort to stop the defacing.

[–] maegul@lemmy.ml 18 points 1 year ago

For those not aware, the beehaw server did intentionally shut their instance down to avoid any issues.

See announcement here: https://hachyderm.io/@beehaw/110687918465426082

[–] RoundSparrow@lemmy.ml 18 points 1 year ago
[–] bamboo@lemmy.blahaj.zone 17 points 1 year ago (5 children)

Just went there and didn't immediately see anything out of the ordinary, but then was redirected to Chatroulette, lol yikes

load more comments (5 replies)
[–] TheVampireSaga@lemmy.world 16 points 1 year ago

Looks like this thread is getting mass downvoted by bots btw

[–] RoundSparrow@lemmy.ml 16 points 1 year ago

The "Hot" sort topic:

load more comments
view more: next ›