• Max-P
    link
    fedilink
    English
    8010 months ago

    I tried to reproduce the exploit on my own instance and it appears that the official Docker for 0.18.1 is not vulnerable to it.

    It appears that the malicious code was injected as an onload property in the markdown for taglines. I tried to reproduce in taglines, instance info, in a post with no luck: it always gets escaped properly in the <img alt="exploit here"> property as HTML entity.

    lemmy.world appears to be running a git commit that is not public.

    • @CMahaff
      link
      English
      4110 months ago

      I actually consider it good news that the redirection is happening this way (something that can be done just by having the lemmy credentials of an admin) vs something indicating they have access to the server itself.

      • @maegul
        link
        English
        3110 months ago

        Yep, same. It was also the most likely scenario.

        It looks like it was an individual admin getting hacked. Not good but not the worst. Most fallout will probably be whether their security practices were sufficient for an admin and whether lemmy has good enough contingencies for this sort of thing. Lemmy’s 2FA is probably a hot issue now though.

        • RoundSparrow
          link
          English
          1810 months ago

          The JWT are likely a hot issue, already some Issues on GitHub about them not being revoked properly.

          • @CMahaff
            link
            English
            1110 months ago

            Oh man, that would be brutal if they are resetting the password and it isn’t kicking the attacker out…

            • Max-P
              link
              fedilink
              English
              1210 months ago

              That’s probably what happened here because they did revoke the admin’s access, but it continued.

              • @CMahaff
                link
                English
                610 months ago

                The issue does say changing the password should kick the user out, but yeah, still not good.

                  • @CMahaff
                    link
                    English
                    4
                    edit-2
                    10 months ago

                    Oh man this one is SO much worse. If this is what is going on the only way to kick out the hacker will probably be to manually alter the DB. Yikes.

                    I hope the admin team is aware of this - not sure how one would even contact them.

          • @darrsil@beehaw.org
            link
            fedilink
            English
            1510 months ago

            Yeah, the Lemmy 2FA implementation sucks. It only works in certain authenticators - Authy not being one of them. Google Authenticator does work and apparently so does the iOS keychain (but can’t confirm that one).

            Best way to do it is to enable it and set it up but keep the settings window open, then open a separate incognito window and try to log in. If your 2FA code doesn’t work, go back to the other settings window and disable it.

            • @bert@lemmy.monster
              link
              fedilink
              English
              610 months ago

              I am using 2fas with no issue and set it up using the method you described. So far, so good…in case anyone needed a vote of confidence!

        • @G59OP
          link
          English
          1010 months ago

          The hacked MichelleG account actually commented that it did not have MFA enabled lol. This was on the lemmy.world shitpost community, on one of the posts making memes about the situation. Hilarious that the hacker decided to share that.

        • Rentlar
          link
          fedilink
          English
          310 months ago

          OK good to know that the server itself is unlikely to be compromised. I’ll be changing passwords to all my accounts once this blows over.

    • redcalcium
      link
      fedilink
      English
      1110 months ago

      It seems the database and the server itself is not compromised? Just an admin account that used to post a markdown XSS exploit?

      • Max-P
        link
        fedilink
        English
        1910 months ago

        Pretty much, and it’s not even XSS (it’s not cross-site), it’s just plain basic HTML injection breaking out of Markdown. At least as far as I was able to find.

    • @tarjeezy@lemmy.ca
      link
      fedilink
      English
      810 months ago

      Last I saw, they were on 0.18.1, unless a very recent update was installed. Do you happen to have a full list of domains they were redirecting to? Just want to be sure they were only going to “harmless” offensive sites, and not something worse.

      • Max-P
        link
        fedilink
        English
        1410 months ago

        As for the version, my instance reports it as

        0.18.1-2-ga6cc12afe
        

        So it seems to be using some extra patches, but I can’t find that commit on GitHub which indicates it might not be public, or cherry-picked locally.

        So with this in mind, either it’s just innocent performance patches, or someone potentially also introduced the markdown vulnerability.

        Although it’s also entirely possible I suck and wasn’t able to reproduce it correctly/had wrong quoting or something. Hopefully the devs can shine some light in the details.

      • Max-P
        link
        fedilink
        English
        1410 months ago

        Only lemonparty (which then redirects to chaturbate) and the pedo image hosted in the pictrs of lemmy.world itself. I saw no evidence of anything else, as people said, it’s a pretty oldschool type of hack to disturb not spread malware.

        But I didn’t dig that much further than that, and it’s only a snapshot of what I gathered before it got fixed. I Ctrl+F “lemonparty” in view source and pasted the JSON in VScode and that’s about it. Didn’t dig much deeper if that was just a red herring.