Found the error Not allowed to load local resource: file:///etc/passwd
while looking at infosec.pub’s communities page. There’s a community called “ignore me” that adds a few image tags trying to steal your passwd file.
You have to be extremely poorly configured for this to work, but the red flags you see should keep you on your toes for the red flags you don’t.
Is this, by any chance, originated from the sub called
ignore me
? In that case is probably my bad because is set as the image of the channel. I was playing with lemmy in the previous version and forgot about it, sorry.I created that channel to investigate why the lemmy instance was hanging every time there was a symbol in the URL, added that URI as icon for fun and forgot about it.
That alert appears because your browser is trying to load an image with that path, nothing dangerous or remotely exploitable, don’t worry.
Edit: I removed it so you shouldn’t see the alert anymore.
P.S. no, it’s not trying to steal anything, it’s your browser trying to load that file as an image but instead of being let’s say this url:
https://beehaw.org/pictrs/image/c0e83ceb-b7e5-41b4-9b76-bfd152dd8d00.png
(this sub icon) , it’s this onefile:///etc/passwd
so you browser is doing the request to your own file. Don’t worry, nothing got compromised.Sure… that’s what they ALL say…
Can confirm it’s still there for the
ignore me
community.Holy shit this is kind of unsettling. Though I would expect ALL major browsers to reject reading any local files like this… would this kind of thing actually succeed somewhere/somehow?
If you ran your browser as root and configured your browser to load local resources on non-local domains maybe. I think you can do that in chrome://flags but you have to explicitly list the domains allowed to do it.
I’m hoping this is just a bad joke.
[This comment has been deleted by an automated system]
you don’t need to be root to read
/etc/passwd
Are you sure? What do you get when you run
cat /etc/passwd
in terminal? Just paste the results here 😇Edit: to anyone reading this on the future, don’t actually do this, it was a joke
yup pretty sure
$ cat /etc/passwd fox:hunter2:1000:1000::/home/fox:/usr/bin/zsh
😉
Weird, all I see is *******
That’s because passwd doesn’t store the password hashes. Just user names.
If you find something, report it. Don’t experiment on the public.
https://www.bugcrowd.com/resources/guide/what-is-responsible-disclosure/