Drawing attention on this instance so Admins are aware and can address the propagating exploit.

EDIT: Found more info about the patch.

A more thorough recap of the issue.

GitHub PR fixing the bug: https://github.com/LemmyNet/lemmy-ui/pull/1897/files

If your instance has custom emojis defined, this is exploitable everywhere Markdown is available. It is NOT restricted to admins, but can be used to steal an admin’s JWT, which then lets the attacker get into that admin’s account which can then spread the exploit further by putting it somewhere where it’s rendered on every single page and then deface the site.

If your instance doesn’t have any custom emojis, you are safe, the exploit requires custom emojis to trigger the bad code branch.

  • bioemerl
    link
    fedilink
    -21 year ago

    The world will never be safe… (increasingly accelerated by climate change)

    Alright, with this wild tangent I’m done here.

    • @[email protected]
      link
      fedilink
      11 year ago

      Ahh I just hit a wound. Just checked your history, of course how could I not see it, a climate-change denier as well, had to be… Well so you’re probably already lost then…

      • bioemerl
        link
        fedilink
        11 year ago

        Guy, climate change is an obvious and currently happening thing that I 100 percent believe is real and needs to be handled.

        Going on wild tangents about how climate change makes everyone not save in a discussion about software security is the problem.