• 0 Posts
  • 10 Comments
Joined 1 year ago
cake
Cake day: July 8th, 2023

help-circle
    1. Inject exploit into a comment using custom emoji.
    2. Front-end parses the emoji incorrectly allowing JavaScript to be injected.
    3. JavaScript loads for everyone to views a page with the comment and sends their token and account type to the hackers domain.
    4. Hacker parses received tokens for admins and uses that to inject redirects into the front page of the Lemmy instance.

    To answer your other questions:

    • IMO there probably should be better parsing to remove this stuff from the back-end, so I’m not sure the front-end solution is the complete solution, but it should get things largely under control.
    • Back-end is theoretically not compromised besides needing to purge all the rogue comments. Attacker presumably never had access to the server itself.
    • Probably needs to be a mass reset of ALL passwords since lots of people’s tokens were sent during the attack, so their accounts could be compromised.








  • My concern is that configuring the site to automatically redirect users sounds like they have pretty large control over the site - the kind of control that I would assume is usually limited to users with root access on the server.

    Obviously hope nothing of value is lost and that there is a proper off-site backup of the content.

    Edit: See Max-P’s comment, it looks like the site redirection was accomplished in a way that IMO suggests they do NOT have full control over the site. We’ll obviously have to wait for the full debrief from the admins.