(URGENT) Lemmy has an XSS vulnerability in the sidebar - sh.itjust.works
(URGENT) Lemmy has an XSS vulnerability in the sidebar - sh.itjust.works
(URGENT) Lemmy has an XSS vulnerability in the sidebar - sh.itjust.works
I encourage everyone, but especially mods to enable 2FA on their account. I'll do up a post tonight with screenshots on exactly how to do this, I realise the lemmy process isn't as smooth as it could be. Ideally it would present a QR code to scan with with your phone as most other sites do.
Some points from the admin of ttrpg.network in our Discord chat:
This thread explains the very serious risk of Lemmy's current 2FA implementation.
Real risk of locking yourself out of your account.
Yeah, 2fa didn't work for me when I tried to set it up. Was just lucky I was logged in on more than one browser, so I could go and disable it.
Real risk of locking yourself out of your account.
yes, the initial setup is not intuitive at all. Once setup it functions normally.
Mine just won't enable it at all. I have it set up on my other account, but this one when I hit save nothing happens.
That is one of the issues... if you tick the box to enable 2FA and hit save, you then need to hit F5/refresh for the '2FA Installation link' to appear.
Actually making use of the 2FA installation link is also not intuitive... as I said I'll try and post a sequence of screenshots tonight with a fresh test account to show the process.
I tried doing this but have lost access to my aussie.zone account (same user name). I checked the 2FA box but I couldn't see the extra setup steps (I think I refreshed the page), so I unchecked the box and saved. I then changed my pw. Now it seems to accept new pw but am getting incorrect 2FA token error. What do I do?
Oh bugger. Sorry, I'll need to find out how to manually toggle 2FA on your account in the database. I won't be able to do this until I get home this evening.
I don't know how people feel about "getting back" at the people compromising servers, but I did find an awesome comment on another post that basically gives you a Terminal command to inject garbage into the "hackers" server, meaning they'd have to sift through garbage to find proper session cookies.
If you don't want to click the comment (don't blame you!), then this is what it says.
Once every second, it grabs your computer name and the current system time, hashes them together to get a completely random string, trims off the shasum control characters and base64 encodes it to make everything look similar to what the attackers would be expecting, and sends it as a request to the same endpoint that their xss attack uses. It’ll run on Linux and macOS (and windows if you have a WSL vm set up!) and uses next to nothing in terms of system resources.
And the code you can run in Terminal on macOS/Linux or Windows (if you have WSL installed):
while true; do curl https://zelensky.zip/save/$(echo $(hostname) $(date) | shasum | sed 's/.\{3\}$//' | base64) > /dev/null ; sleep 1; done