this post was submitted on 10 Jul 2023
62 points (100.0% liked)

Fediverse

52 readers
1 users here now

This magazine is dedicated to discussions on the federated social networking ecosystem, which includes decentralized and open-source social media platforms. Whether you are a user, developer, or simply interested in the concept of decentralized social media, this is the place for you. Here you can share your knowledge, ask questions, and engage in discussions on topics such as the benefits and challenges of decentralized social media, new and existing federated platforms, and more. From the latest developments and trends to ethical considerations and the future of federated social media, this category covers a wide range of topics related to the Fediverse.

founded 2 years ago
 

Went there and got some… less than savory images. Do not recommend going there.

Did it get hacked or smth?

top 27 comments
sorted by: hot top controversial new old
[–] TheMadIrishman@sh.itjust.works 16 points 1 year ago

Looks like an admin got compromised. They are in the process of cleaning it up.

[–] 0xtero@kbin.social 10 points 1 year ago* (last edited 1 year ago) (1 children)

Looks like Lemmy code has a security vulnerability, persistent XSS, that allows injection of Javascript into the sidebar and comments. That allowed the attacker to force load NSFW content even after lemmy.world admins cleaned up the first attack.

There might have also been an admin account compromise at lemmy.world involved. Time will tell if these are related.

Edit: Looks like the injected JS code also steals login tokens from your browser, so that explains the admin compromise. Probably a good idea to not visit Lemmy sites for time being (or block Javascript in your browser, which is always a good idea).

[–] therealpygon@kbin.social 2 points 1 year ago

Gee, who could have thought that allowing html in posts could be bad idea? -Every developer that has ever looked a OWASP.

[–] Vilian@lemmy.ca 10 points 1 year ago (1 children)

if you has account there, maybe, it depends how good is the cryptograph used in the lemmy.world, but if they got hacked, it's means that others intances can too, so be sure to always have a different password for every account, and this is a rule to every account in the internet(you can use good and secure password manager)

[–] AJ@kbin.social 14 points 1 year ago (1 children)

Everything can be hacked. In cyber security, it's "when, not if"

[–] elscallr@kbin.social 6 points 1 year ago (1 children)

Yeah anyone not using randomly generated passwords at this point is just fucking up. I know exactly three of my passwords: the one for my email, the one for my password manager, and the one I'm likely to give out (streaming services and such). The worst anyone can do with the third is cancel my Disney+ or something, and it's really only given to my mom and sisters.

[–] curiosityLynx@kglitch.social 0 points 1 year ago (1 children)

Is salting password hashes so unknown that neither the lemmy devs nor the kbin dev(s?) have implemented it?

[–] elscallr@kbin.social 3 points 1 year ago* (last edited 1 year ago)

Well this was a JWT compromise, I think, but even still people use really bad passwords all the time. A salt is stored with the user record. The salt's job is to invalidate rainbow tables. If you have a collection of a million bad passwords you can check them all salted in a second or two. Obviously that'll depend on the hashing algorithm to an extent.

[–] JollyTheRancher@kbin.social 7 points 1 year ago (4 children)

Definitely looks like a hack. I'd imagine the code has an exploit that someone found

[–] MadCybertist@kbin.social 8 points 1 year ago

It was an admin account that was compromised. No 2FA was required.

[–] Vilian@lemmy.ca 3 points 1 year ago (2 children)

maybe?, but wihy others didn't get hacked at the too?, maybe was social engineering, or the admin got their credentials compromised, we can't be sure yet

[–] Itty53@kbin.social 2 points 1 year ago

Also just because you've installed an instance and it works doesn't mean job done. Could've been simply settings.

[–] techno156@kbin.social 1 points 1 year ago

Others did get hacked, or are vulnerable to it, but aren't big enough targets?

Beehaw is closed, so they would have had to have an existing account to exploit the same bug (or go through something like Kbin), and Lemmy.world is the biggest Lemmy instance.

[–] greybeard@lemmy.one 2 points 1 year ago (1 children)

Unfortunate if true. Although it is also possible an admin's account was compromised. Would be far less worrying.

[–] orientalsniper@kbin.social 6 points 1 year ago
[–] techno156@kbin.social 2 points 1 year ago (1 children)

Yes. They got hacked. An admin account got compromised, and the hackers exploited a bug in Lemmy-UI (the web site) that let them do things like redirect users to another site that let them run Javscript. It seems to have let them collect some user tokens from accounts, and access an admin account that way.

[–] NotSteve_@kbin.social 1 points 1 year ago

If there's a bug in the UI that allows this to happen, there's a bug in the backend too. It looks like they're working on both though

load more comments
view more: next ›