this post was submitted on 10 Jul 2023
31 points (100.0% liked)

Android

407 readers
5 users here now

The new home of /r/Android on Lemmy and the Fediverse!

Android news, reviews, tips, and discussions about rooting, tutorials, and apps.

🔗Universal Link: !android@lemdro.id


💡Content Philosophy:

Content which benefits the community (news, rumours, and discussions) is generally allowed and is valued over content which benefits only the individual (technical questions, help buying/selling, rants, self-promotion, etc.) which will be removed if it's in violation of the rules.


Support, technical, or app related questions belong in: !askandroid@lemdro.id

For fresh communities, lemmy apps, and instance updates: !lemdroid@lemdro.id

💬Matrix Chat

💬Telegram channels / chats

📰Our communities below


Rules

  1. Stay on topic: All posts should be related to the Android OS or ecosystem.

  2. No support questions, recommendation requests, rants, or bug reports: Posts must benefit the community rather than the individual. Please post to !askandroid@lemdro.id.

  3. Describe images/videos, no memes: Please include a text description when sharing images or videos. Post memes to !androidmemes@lemdro.id.

  4. No self-promotion spam: Active community members can post their apps if they answer any questions in the comments. Please do not post links to your own website, YouTube, blog content, or communities.

  5. No reposts or rehosted content: Share only the original source of an article, unless it's not available in English or requires logging in (like Twitter). Avoid reposting the same topic from other sources.

  6. No editorializing titles: You can add the author or website's name if helpful, but keep article titles unchanged.

  7. No piracy or unverified APKs: Do not share links or direct people to pirated content or unverified APKs, which may contain malicious code.

  8. No unauthorized polls, bots, or giveaways: Do not create polls, use bots, or organize giveaways without first contacting mods for approval.

  9. No offensive or low-effort content: Don't post offensive or unhelpful content. Keep it civil and friendly!

  10. No affiliate links: Posting affiliate links is not allowed.

Quick Links

Our Communities

Lemmy App List

Chat and More


founded 1 year ago
MODERATORS
 

cross-posted from: https://lemmy.ml/post/1895271

FYI!!! In case you start getting re-directed to porn sites.

Maybe the admin got hacked?


edit: lemmy.blahaj.zone has also been hacked. beehaw.org is also down, possibly intentionally by their admins until the issue is fixed.

Post discussing the point of vulnerability: https://lemmy.ml/post/1896249

top 22 comments
sorted by: hot top controversial new old
[–] cole@lemdro.id 10 points 1 year ago* (last edited 1 year ago)

Hey everyone, this exploit is present in the custom emoji feature of Lemmy. Because lemdro.id does not use custom emojis, we are not vulnerable at this time.

[–] TheSaneWriter@lemm.ee 2 points 1 year ago (1 children)

Deeply unfortunate that something like this could happen, you always hope that code injection vulnerabilities are found before someone is hacked. With that in mind, this shows the importance of two security principles: always parse and clean user input and don't click links (including images) before checking where they are going to send you.

[–] db2@lemmy.one 2 points 1 year ago (1 children)

This used an onLoad which isn't generally shown when you hover over a link in a browser. Most people, even devs, aren't going to jump on the console to check every link.

NoScript would probably have helped though.

[–] erre@feddit.win 5 points 1 year ago

What kind of terrible markdown editor allows adding onload scripts to images though.. it's insane.

[–] db2@lemmy.one 2 points 1 year ago (1 children)

Script kiddies. insert eyeroll emoji here

[–] Tywele@lemmy.dbzer0.com 0 points 1 year ago

Here take this: 🙄

[–] TheSaneWriter@lemm.ee 1 points 1 year ago (1 children)

Deeply unfortunate that something like this could happen, you always hope that code injection vulnerabilities are found before someone is hacked. With that in mind, this shows the importance of two security principles: always parse and clean user input and don't click links (including images) before checking where they are going to send you.

[–] Dioxy@programming.dev 1 points 1 year ago

It’s worse than that. Until Lemmy is more mature, I would reccomend using the lite version of Lemmy, the JS-free version, for sake of client side security. Alternatively, or as an added point of security, the front-ends themselves should implement more sanitazion themselves. I’m willing to spend some free time vulnerability testing, but I would need a dedicated sand-box for that.

[–] Banana@kbin.social 1 points 1 year ago (3 children)

In all seriousness, no one is talking about this, but this is the one disadvantage of open source software being developed by volunteers, we don't know exactly how the admin accounts were hacked but the XSS stuff is really basic stuff, none of those fields were sanatised at all, and it makes me concerned what else has been missed, obviously the advantage of open source is in time this stuff can get fixed, but this is what happens when loads of people who aren't experts contribute to a site.

In comparison to sites where there is a fully hired developer team the quality of the code is significantly better. I really hope the passwords were hashed on these instances and the hackers didn't get plain text passwords or anything really bad like this.

One thing and credit to Ernest, as I've contributed there he does very thorough code reviews and his quality of code is very good, its why im confident kbin won't be hacked.

[–] jcg@halubilo.social 1 points 1 year ago

The two main Devs of Lemmy do this full time. They're not hired in a traditional sense, but the project is funded enough for them both to work on it as their full time job. Now, this isn't a problem with open source, I'm a professional software Dev and you would not BELIEVE how many enterprise, proprietary systems are still doing things like building SQL statements by directly concatening strings that come from user input (especially in enterprise software cause, well, who's gonna fuck around with it?). No, this is a problem of having this many eyeballs on you. The tiny little places they slipped up and didn't properly sanitize a user input string was found and exploited. Most proprietary systems do NOT reach this level of user count, and in particular Lemmy attracts a certain more tech-savvy demographic that would've found this sooner or later, malicious or not. Remember, this vulnerability was not just found, somebody was looking for it.

[–] PupBiru@kbin.social 0 points 1 year ago

yes and no: there are a couple of schools of thought!

of course, code by a lot of people without proper review is… risky

however, at least it’s able to be reviewed! and in time and with enough eyeballs, hopefully that code will become far more robust. that’s the benefit of transparency: anyone can review any line at any time!

remember: closed-source code as plenty of vulnerabilities too! just if we can’t review it, it’s much harder to work out what they might be… often, closed source vulnerabilities can exist for years without the vendor ever patching them because nobody is calling them out on it… hell, they can even know that their software is actively being exploited and just… not tell anyone

[–] Fal@yiffit.net 0 points 1 year ago (1 children)

I think you've never worked in software, or even used software, if you think paid close source apps don't have issues like this. They can be worse because they're written by interns and no one there actually cares, they just want their paycheck

[–] avidamoeba@lemmy.ca 0 points 1 year ago* (last edited 1 year ago)

I concur that the security behind closed doors I've seen is often non-existent. The incentives are typically stacked against security.

[–] mutant@kbin.social 0 points 1 year ago (3 children)

I think it's hilarious that Reddit protesters were redirected to NSFW content, karma is coming around lmfao

[–] ZILtoid1991@kbin.social 1 points 1 year ago

Are you the hacker, who did this?💀

[–] XiELEd@kbin.social 1 points 1 year ago (1 children)

What karma? Spez started it by being a liar 🤷‍♂️ so I say it is natural that people stop supporting him.

[–] thayer@lemmy.ca 1 points 1 year ago

Dude's got 44 comments and every single one is a complaint about the reddit protest or protestors. Might just be spez himself lol

[–] Dio@kbin.social 0 points 1 year ago

I can sense tears and hurt through your, "lmfao"

[–] darrsil@lemdro.id 0 points 1 year ago* (last edited 1 year ago) (1 children)

Did this result in Lemmy.world being defederated from Lemdro.id?

Lemmy.world is back up and the hack is over, but when I view !android@lemdro.id using my lemmy.world account I can't see anything.

EDIT: In case anyone else is having this problem, the issue was my language settings. Despite having “Undetermined” set as a language, that was the problem - I clicked the little “X” to unselect all languages and then saved, and now it’s working again.

[–] cole@lemdro.id 1 points 1 year ago

I have not de-federated other instances simply because lemdro.id is not vulnerable to this particular exploit

[–] ElectronSoup@kbin.social 0 points 1 year ago (1 children)

beehaw isn't down, just very slow, which is it's normal state of being if we're being honest

[–] jherazob@kbin.social 1 points 1 year ago

It IS intentionally down, post by the admins

load more comments
view more: next ›