- cross-posted to:
- sdfpubnix@lemmy.sdf.org
- fediverse@kbin.social
- chat@iusearchlinux.fyi
- cross-posted to:
- sdfpubnix@lemmy.sdf.org
- fediverse@kbin.social
- chat@iusearchlinux.fyi
A number of Lemmy instances have been hacked overnight.
Some may remain inaccessible until they have been secured and restarted.
As a safety precaution logged-on sessions on many servers have been cancelled and you are required to logon again.
Unfortunately, the only way I could find to do this in Liftoff! is by going to Settings > Accounts and deleting each local account by long pressing on it, and then create it again.
All your posts, comments and bookmarks should be preserved during this process.
Please see the linked posts for further details as they emerge.
Thanks all, and please bear with us as this gets resolved.
This seems to be the issue, a code injection using custom emojis. Apparently Lemmy is letting some unsanitized data in, which means that Little Bobby Tables strikes again. Somebody was afraid the attackers had seized control of the whole Lemmy network but federation helps hinder the damage here, only individual instances are affected and they’d have to attack each one independently, a single server service would be fully affected in this case.
Beehaw has fully taken down the server as a preventive measure, i imagine they won’t be the last ones doing this.
This makes me shudder from my time running forums.
OOB vbulletin was notoriously bad at fending off sql injections, and required CONSTANT monitoring, tweaking, or disabling of basic features to keep the Syrian Liberation Army (as one particular example) from pwning an admin account.
Also, and covered in detail, JWT should not be your default for sessions.