this post was submitted on 10 Jul 2023
370 points (93.0% liked)

Selfhosted

42763 readers
1137 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

This issue is already quite widely publicized and quite frankly "we're handling it and removing this" is a much more harmful response than I would hope to see. Especially as the admins of that instance have not yet upgraded the frontend version to apply the urgent fix.

It's not like this was a confidential bug fix, this is a zero day being actively exploited. Please be more cooperative and open regarding these issues in your own administration if you're hosting an instance. 🙏

top 50 comments
sorted by: hot top controversial new old
[–] TragicNotCute@lemmy.world 115 points 2 years ago (20 children)

IMO it’s not a good idea to be discussing attack vectors publicly when a number of other instances are unpatched and the exploit has been in the wild for less than a day.

I agree that admins need to work together, but discussing it in public on Lemmy so soon after the attack isn’t the way. There exists a Matrix channel for admins, that’s where this type of thing should go.

[–] entropicshart@lemmy.world 109 points 2 years ago* (last edited 2 years ago) (1 children)

When a vulnerability at this level happens and a patch is created, visibility is exactly what you need.

It is the reason CVE sites exist and why so many organizations have their own (e.g. Atlassian, SalesForce/Tableau )

It is also why those CVE will be on the front page of sites like https://news.ycombinator.com to ensure folks are aware and taking precautions.

Organizations that do not report or highlight such critical vulnerabilities are only hurting their users.

[–] TragicNotCute@lemmy.world 56 points 2 years ago (2 children)

It is common practice to notify affected parties privately and then give full details to the public after the threat is largely neutralized. Expecting public disclosure with technical details on how to perform the attack in less than 24 hours goes against established industry norms.

[–] Dark_Arc@lemmy.world 45 points 2 years ago

That only stands true when the issue is not being actively exploited.

[–] andrew@lemmy.stuart.fun 68 points 2 years ago* (last edited 2 years ago) (1 children)

If this was not a zero day being actively exploited then you would be 100% correct. As it is currently being exploited and a fix is available, visibility is significantly more important than anything else or else the long tail of upgrades is going to be a lot longer.

Keep in mind a list of federated instances and their version is available at the bottom of every lemmy instance (at /instances), so this is a really easy chain to follow and try to exploit.

The discovery was largely discussed in the lemmy-dev Matrix channel, fixes published on github, and also discussed on a dozen alternate lemmy servers. This is not an issue you can really keep quiet any longer, so ideally now you move along to the shout it from the mountaintop stage.

[–] hawkwind@lemmy.management 3 points 2 years ago (1 children)

FYI for anyone looking to deface more instances, That list is only updated every 24 hours. Depending on when it last run on your home instance, the info could be out of date.

[–] andrew@lemmy.stuart.fun 4 points 2 years ago

I think it also only shows backend version, not frontend, so it won't reflect this fix.

[–] xantoxis@lemmy.one 13 points 2 years ago

OK, as long as all the well-meaning people stop discussing it, nobody will ever find out about it.

Son, this is not it.

[–] tko@tkohhh.social 2 points 2 years ago (2 children)

Where is this Matrix Channel? Is it private? How can I get access as an instance admin?

[–] ColonelPanic@lemmy.ml 7 points 2 years ago (1 children)
[–] andrew@lemmy.stuart.fun 3 points 2 years ago

Presumably that channel (I hadn't seen it there) and https://matrix.to/#/#lemmydev:matrix.org, which is actually where I was watching for the fix.

[–] kresten 4 points 2 years ago (3 children)

It isn't private, I think there's a link on the girhub

[–] hawkwind@lemmy.management 2 points 2 years ago (1 children)

If the only criteria to be in a private channel for admins is being an admin, there’s no use making it private. ;) Unless your just looking to filter out bad actors who don’t want to take 5 min and 5$ to make an instance.

[–] kresten 2 points 2 years ago

I have an account that's in there without being an administrator.

load more comments (2 replies)
load more comments (16 replies)
[–] popemichael@lemmy.world 33 points 2 years ago

It's strange that they would try to bury this information.

The number 1 tool against future hacks like this is education.

[–] exu@feditown.com 14 points 2 years ago (1 children)

From what I found digging through some posts, this exploit only works if your instance uses custom emoji. Federated custom emoji are apparently harmless.

[–] andrew@lemmy.stuart.fun 6 points 2 years ago

Yes, if you have no custom emoji on your instance, you should not be vulnerable. A valid workaround before the fix is also to just remove all custom emoji, from what I've also read.

I'm not sure what to think about that instance. I saw some weird stuff in the mod protocol recently, if I remember correctly... Like some drama going on, etc.

[–] fox@lemmy.fakecake.org 6 points 2 years ago (17 children)

unfortunately there's no images for 0.18.2-anything yet :(

[–] andrew@lemmy.stuart.fun 19 points 2 years ago* (last edited 2 years ago) (1 children)

There are, via dessalines' repo. It's for lemmy-ui only, at 0.18.2-rc.1.

I have it running already on my instance, and have for 93min now.

[–] fox@lemmy.fakecake.org 2 points 2 years ago

thanks, I guess I missed it. gonna update ASAP just in case, even though I'm the only user of my instance.

[–] slashzero@hakbox.social 7 points 2 years ago* (last edited 2 years ago) (1 children)

Yes, there is: 0.18.2-rc.1, which has the hot fix, but will also require a DB query to "fix" the modlog once upgraded.

load more comments (1 replies)

For amd64, Lemmy dev Dessalines pushes images to his Docker Hub repo usually right after a new version comes out.

Since they don't release arm64 builds anymore, I build them regularly and push them to my repo, which can be found here.

load more comments (14 replies)
load more comments
view more: next ›