Drawing attention on this instance so Admins are aware and can address the propagating exploit.

EDIT: Found more info about the patch.

A more thorough recap of the issue.

GitHub PR fixing the bug: https://github.com/LemmyNet/lemmy-ui/pull/1897/files

If your instance has custom emojis defined, this is exploitable everywhere Markdown is available. It is NOT restricted to admins, but can be used to steal an admin’s JWT, which then lets the attacker get into that admin’s account which can then spread the exploit further by putting it somewhere where it’s rendered on every single page and then deface the site.

If your instance doesn’t have any custom emojis, you are safe, the exploit requires custom emojis to trigger the bad code branch.

  • Bread@sh.itjust.works
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    Don’t know, I don’t have enough information. Though my point were if it were intentional. I am going to hazard a guess by how they are scrambling to send out patches that it probably wasn’t intended by the creators.

    The kind of developers that would put a back door in their software probably are also working on things with far more value potential than an open source forum where they could easily be caught. Perhaps like banks or weapons depots.

    • bioemerl@kbin.social
      link
      fedilink
      arrow-up
      2
      arrow-down
      4
      ·
      1 year ago

      No. They didn’t catch this. It compromised an administrator on a massive instance.

      It wasn’t intentional. It proves that when it is intentional it’ll be easily done and it’s a mistake to trust the Lemmy code base.

      • Bread@sh.itjust.works
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        And the problem was fixed right afterwards and is currently being pushed out for admins to update to. Look, like it or not, shit happens. Expecting it to be full proof is unrealistic. It is a young software.

        Just because it happened unintentionally, doesn’t prove that we can’t trust the developers to not put back doors in. Even if they did, why would they? What is there to gain for the developers adding a backdoor to it? Versus the risk of doing so? Is it ever worth the trouble when it is very much possible to find out if they did?

        Lemmy has no financial value. That is the point. We don’t use credit cards here, people rarely use their names, email verification isn’t mandatory on all instances, passwords are potentially useful but you still need to know who they belong to. It is just such a great risk to their reputation for such a small gain.

        • bioemerl@kbin.social
          link
          fedilink
          arrow-up
          1
          arrow-down
          3
          ·
          1 year ago

          And the problem was fixed right afterwards

          Which is expected. When it comes to security the fact it happened at all is the problem.

          I don’t expect the software to be fool proof. All software has bugs and problems, but this software is specifically developed by bad actors who will eventually use the platform to fuck you over.

          Just because it happened unintentionally, doesn’t prove that we can’t trust the developers

          The developers aren’t trustworthy on the account of their extremist ideology, not on account of this bug happening. This bug is evidence that despite the fact that this project is open source you should not just brush off that extremist ideal as “no big deal”.

          Lemmy has no financial value.

          And immense social value.

          • leviosa@programming.dev
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            1 year ago

            The developers aren’t trustworthy on the account of their extremist ideology…

            What do you mean by that? Are they hell bent on using Rust Nightly and making overly-judicious use of .unwrap()?

            edit: I see that you mean they are Marxist-adjacent.

          • Bread@sh.itjust.works
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            We can argue non stop about politics, but that isn’t the point. Whether or not we agree with their politics is irrelevant to their ability to build a social platform. Until we start to see their beliefs affecting their software decision making in a negative way, we cannot complain about it. As they may or may not have popular opinions, that is a very good reason for them to have a great platform. So they can share them without fear of retaliation.

            However, they have so far done nothing to show they can’t be trusted to not make unbiased or malicious software. It is incredibly rude to assume they will.

            If you have evidence showing they cannot be trusted, please come forth with it. We need to know it.

            • bioemerl@kbin.social
              link
              fedilink
              arrow-up
              1
              arrow-down
              1
              ·
              1 year ago

              Until we start to see

              You’ll be about a billion days too late and the entire network will have been compromised for ages. You don’t operate on a “oh let’s just trust the authoritarian communists until they do something bad” policy.

              • Bread@sh.itjust.works
                link
                fedilink
                arrow-up
                1
                ·
                1 year ago

                Alright, so what do they plan to do? Compromise Lemmy, sure. Then what? What do they gain? Propaganda?

                • bioemerl@kbin.social
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  1 year ago

                  Basically pull data on various accounts (IP address, activity history, etc), people, and trends. They could promote given posts or suppress posts or hide things from moderators. They could distribute whatever malware they might like, target specific accounts that way…

                  The possibilities are many.

                  • Bread@sh.itjust.works
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    1 year ago

                    Even so, it just seems like a lot of work and risk for something that would not be necessary to achieve those or similar goals. Besides, if word gets out that the software is compromised, then people will just stop using it. The much better/easier solution would be run scams, vote manipulation, etc as it doesn’t kill your platform that you would then be using to push a goal or agenda.

                    The name of the game is to not be noticed. You have a bad user or instance, they get banned and make a new one. Compromising the whole thing though? That’s one and done, especially where the Lemmy croud is a lot more tech oriented than most other platforms.

                    My point being that why compromise Lemmy for a short while then have it die vs playing the long game and have an ever increasing user base to scam, steal from or manipulate? It just doesn’t make sense when you think about it.