While I was asleep, apparently the site was hacked. Luckily, (big) part of the
lemmy.world team is in US, and some early birds in EU also helped mitigate this.
As I am told, this was the issue: - There is an vulnerability which was
exploited - Several people had their JWT cookies leaked, including a...
A number of Lemmy instances have been hacked overnight.
Some may remain inaccessible until they have been secured and restarted.
As a safety precaution logged-on sessions on many servers have been cancelled and you are required to logon again.
Unfortunately, the only way I could find to do this in Liftoff! is by going to Settings > Accounts and deleting each local account by long pressing on it, and then create it again.
All your posts, comments and bookmarks should be preserved during this process.
Please see the linked posts for further details as they emerge.
Thanks all, and please bear with us as this gets resolved.
This seems to be the issue, a code injection using custom emojis. Apparently Lemmy is letting some unsanitized data in, which means that Little Bobby Tables strikes again. Somebody was afraid the attackers had seized control of the whole Lemmy network but federation helps hinder the damage here, only individual instances are affected and they'd have to attack each one independently, a single server service would be fully affected in this case.
This makes me shudder from my time running forums.
OOB vbulletin was notoriously bad at fending off sql injections, and required CONSTANT monitoring, tweaking, or disabling of basic features to keep the Syrian Liberation Army (as one particular example) from pwning an admin account.
Unfortunately, the only way I could find to do this in Liftoff! is by going to Settings > Accounts and deleting each local account by long pressing on it, and then create it again.