The Lemmy.world hack made a good opportunity to explore other instances out there. Found one based in my area. Back in action!

You are viewing a single thread.
View all comments
2 points

What happened?

permalink
report
reply
7 points
*

From what I have read so far…

XSS injection in custom emojis.
Essentially, custom emojis used by instances could allow a malicious actor to execute arbitrary code on clients that saw the emoji (within the scope of the website).
There is speculation about links and other vectors, but those aren’t clear yet. But the successful attacks have been tracked back to emojis.

The emojis aren’t federated, so it would only affect users of that instance that viewed the emoji during the attack.

The injected script (as it was being execute as part of the client UI, thus trusted) had access to the client cookies for the instance.
It would steal the JWT tokens stored in the cookies and send them to a 3rd party site.

Tokens of Admins were then used by the attackers to deface the sites.

It’s unclear what user data would have been vulnerable during this time - still being investigated.
There is a high likelihood that this is a GDPR reportable incident.

The fix is for admins to delete all custom emojis via the database, then rotate JWT secrets.
Rotating the secrets invalidates all users JWTs, so everyone has to log in again. This also invalidates the stolen JWTs.

permalink
report
parent
reply

Lemmy

!lemmy@lemmy.ml

Create post

Everything about Lemmy; bugs, gripes, praises, and advocacy.

For discussion about the lemmy.ml instance, go to !meta@lemmy.ml.

Community stats

  • 861

    Monthly active users

  • 1.2K

    Posts

  • 14K

    Comments

Community moderators