this post was submitted on 10 Jul 2023
75 points (95.2% liked)

Meta (lemm.ee)

4126 readers
1 users here now

lemm.ee Meta

This is a community for discussion about this particular Lemmy instance.

News and updates about lemm.ee will be posted here, so if that's something that interests you, make sure to subscribe!


Rules:


If you're a Discord user, you can also join our Discord server: https://discord.gg/XM9nZwUn9K

Discord is only a back-up channel, [email protected] will always be the main place for lemm.ee communications.


If you need help with anything, please post in !support instead.

founded 2 years ago
MODERATORS
 

See Here, Here and Here for information about the current situation and the exploits being used.


UPDATE

Lemm.ee Admin @sunarus responded Here, TLDR is that Lemm.ee isn't vulnerable, would advise reading the message if you're still concerned.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 84 points 2 years ago* (last edited 2 years ago) (11 children)

Hey folks! I have spent this morning helping lemmy.world mitigate the issue. I have also sent out mitigation instructions to other admins as well.

For the particular exploit that was used on lemmy.world:

  1. It does not spread through federation
  2. lemm.ee was not vulnerable in the first place
  3. As mentioned above, it has already been mitigated on lemmy.world

So there should not be any reason to defederate. I will continue monitoring and investigating, if further vulnerabilities pop up then I will adjust accordingly.

[–] [email protected] 10 points 2 years ago (3 children)

You rock! Sorry if this is a stupid question, but if both instances are running the same version of Lemmy, why would lemmy.world be affected but not lemm.ee?

[–] [email protected] 10 points 2 years ago (1 children)

Malicious custom emoji contained scripts that sent session cookies to the attackers.

[–] [email protected] 2 points 2 years ago

Makes sense! Thank you.

load more comments (1 replies)
load more comments (8 replies)