The one reserved for residential usage is home.arpa
.
I think the lemmy.world admin posted on his official Mastodon.
If you run the instance only for yourself then I’d say it makes you an unattractive target. Why do a lot of work to hack an instance with one user?
But yeah, since Lemmy’s code is not super mature there’ll be some pains in the short term.
Oops indeed. Lemmy needs a security audit 😬
Looks like lemmy.blahaj.zone is back
Thanks for sharing! Forgot to look this up, tuned into the match late. That was a brutal hit. First time I see a ref injured.
Realizing this blew my mind. Definitely more interesting than following people.
I’d wager you’re likely fine if you’re using a mobile app when the affected image loads. Also, it appears they’re stealing auth tokens… not passwords or anything. At worst they could impersonate you until your token expires… but you’re not a high value target unless you’re an admin of an instance.
What kind of terrible markdown editor allows adding onload scripts to images though… it’s insane.
If it’s onload
then simply viewing the image runs that script. Yikes.
This is hilariously timed considering the current panic at the hacked instances.
Tough call, probably for the best. Hopefully it’s resolved soon.
I think that’s right on the money.
The sophistication is impressive, using emojis. Are people getting paid to find the vulnerabilities or are they just bored??
I think they’re stealing auth tokens, not sure if 2fa would help. It looks like there may be a vulnerability in the markdown editor and being able to insert JavaScript. The JS being able to access your cookies to share them is the second issue.
Curl didn’t return anything. They’re likely just using it to log requests since the request path contains the data they need.
I’d be willing to bet they’re using the API to make all the changes. The cookie has the jwt token. I don’t believe you need the username (at least judging by the js API docs).
Looks like it’s issuing a GET to https://zelensky.zip/save/{ENCODED_JWT_TOKEN_AND_NAV_FLAG}
.
The ENCODED_JWT_TOKEN
is from btoa(document.cookie+nav_flag)
where nav_flag
is essentially 'navAdmin'
if the account hit is an admin or ''
if the user hit is not an admin (it checks if the admin button in the nav exists). Their server is likely logging all incoming requests and they just need to do a quick decoding to get jwt tokens and a flag telling them if it’s an admin account.
I’d be hesitant to visit Lemmy on a browser atm 😓
I like that imgur removes exif data, any recommendations that do that too?
I took a look at a few posted and they don’t appear to do so.