Discord Screwed Up… Badly

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ก.ย. 2024

ความคิดเห็น • 934

  • @Doctorgeo7
    @Doctorgeo7 ปีที่แล้ว +3103

    Wow... This is a school grade level exploit. Anyone who paid attention to basic website security knows how to prevent this attack. And yet Discord's dev team is so incompetent that it couldn't even prevent something this basic.

    • @0.r0
      @0.r0 ปีที่แล้ว +234

      discords dev team is 12 year olds what want the badge

    • @pseudoscientist8010
      @pseudoscientist8010 ปีที่แล้ว +15

      So why it this action not considered as in purpose? If so much money is being stolen, then a kickback is obvious.

    • @bitrare7
      @bitrare7 ปีที่แล้ว +44

      @@0.r0 You seem like you're 12 with that spelling. Discord devs work at discord for money not a badge? And you have to be over 18 to actaully work at discord.

    • @bitrare7
      @bitrare7 ปีที่แล้ว +13

      Bros the developer police 😭 the devs have hundreds of things to do they aren't able to check every little thing

    • @0.r0
      @0.r0 ปีที่แล้ว +69

      @@bitrare7 seem*
      Just because I don't use grammar does not mean I'm a 12 year old. Also, you could learn how to understand a joke?

  • @jackdavenport5011
    @jackdavenport5011 ปีที่แล้ว +902

    The crazy thing is that React (which Discord is built with) literally has XSS protection built into it, meaning the developers had to deliberately go out of their way to make this exploit possible.

    • @Choroalp
      @Choroalp ปีที่แล้ว +10

      Discord is made with electron

    • @hovac.
      @hovac. ปีที่แล้ว

      @@Choroalp youre dumb

    • @Choroalp
      @Choroalp ปีที่แล้ว

      @@hovac. yes i am(and how do fuck you managed to find me)( some people saying itami might be backdoored)

    • @rice8864
      @rice8864 ปีที่แล้ว +227

      @@Choroalp electron is the desktop framework, react is the frontend framework which discord is built with

    • @tabiasgeehuman
      @tabiasgeehuman ปีที่แล้ว +83

      @@Choroalp electron is just repackaged chrome and nodejs. You can use any framework with it, including react, which is what discord does

  • @Brabbs
    @Brabbs ปีที่แล้ว +760

    God, the absolute leveling that this guy does is addicting.
    This guy feels like one of those parents that would go: "Yeah, school sucks, heres why it sucks-"

  • @lior_haddad
    @lior_haddad ปีที่แล้ว +622

    They use React and still got an XSS issue?! That's honestly unforgivable.

    • @jojo989GD
      @jojo989GD ปีที่แล้ว +1

      lmaao

    • @jackdavenport5011
      @jackdavenport5011 ปีที่แล้ว +70

      Lmao someone just likes using dangerouslySetInnerHTML

    • @rednexie
      @rednexie ปีที่แล้ว +14

      @@jackdavenport5011 lmao they should just change it to innertext and its gone

    • @adrianozuna875
      @adrianozuna875 ปีที่แล้ว +5

      Do they even code review at this point

    • @adrianozuna875
      @adrianozuna875 ปีที่แล้ว

      @@frank8627-v8k You're right lmaoo

  • @GamerShyUncut
    @GamerShyUncut ปีที่แล้ว +75

    Fun fact. Changing your password doesn't always work. I actually once got hacked on Discord, and instantly changed my password the moment I knew what had happened. Before the scammer even had a chance to do it themselves. They still got control of my account.
    Next level tomfoolery indeed.

    • @NotAFanMan88
      @NotAFanMan88 ปีที่แล้ว +40

      In token stealing exploits, you may have to explicitly invalidate all your login sessions, which discord does allow you to do. Changing passwords doesn't necessary invalidate all existing login session tokens, though if discord had any sense they should.

    • @theseangle
      @theseangle ปีที่แล้ว +6

      They probably just send an automatic POST request to change the password to the discord server upon receiving the token immediately. Most likely that's why you don't have time to change your password in time

  • @rvs570
    @rvs570 ปีที่แล้ว +895

    Why don't we create a script that generates tokens and sends them to all known token saving sites? Fill up their databases and have them be less effective

    • @rvs570
      @rvs570 ปีที่แล้ว +145

      Actually, I found my goal for today xD

    • @polaris2707
      @polaris2707 ปีที่แล้ว +212

      Safer to send junk and not actual tokens. Provided they don't have checking it'll still work and doesn't carry the risk of accidentally sending a legit token.

    • @jsh722
      @jsh722 ปีที่แล้ว +63

      well there is a chance you can generate a legit token

    • @rvs570
      @rvs570 ปีที่แล้ว +40

      @@polaris2707 Yea, would probably make sure to add or remove some random part to it to be safe

    • @rick-sanchez
      @rick-sanchez ปีที่แล้ว +25

      Exactly my thought. You just need to put it trough a service that sends it from different IP addresses first or they can filter it easily.

  • @MaahirMomtaz12
    @MaahirMomtaz12 ปีที่แล้ว +382

    This seems to be a monthly thing now. Just don't click links. Simple

    • @rebane2001
      @rebane2001 ปีที่แล้ว +36

      XSS vulnerabilities like this one are very rare.

    • @stryrok4216
      @stryrok4216 ปีที่แล้ว +8

      I dont know if I should say this but I literally saw/knew a guy who said he can just token grab people by just giving a invite link and that was over a year ago ,just how many people have known about it before this vid almost scary

    • @AANyt
      @AANyt ปีที่แล้ว +6

      i mean, this link is looking safe. So the only possibility is, to not use the internet at all or don't use services like discord (what ever this means)

    • @SurmenianSoldier
      @SurmenianSoldier ปีที่แล้ว +2

      @@AANyt or just don't be dumb and have like 3000 layers of protection ezez

    • @tzarg
      @tzarg ปีที่แล้ว

      @@SurmenianSoldier or don't be dumb and click on whatever unsuspecting tinyurl links you see pop up

  • @tairitsu5560
    @tairitsu5560 ปีที่แล้ว +34

    I've heard Twitter had a self-retwitting script that works just like this, but that was several years ago.
    Can't believe this still happens

    • @Coder_Tavi
      @Coder_Tavi ปีที่แล้ว

      th-cam.com/video/zv0kZKC6GAM/w-d-xo.html

    • @Knaeckebrotsaege
      @Knaeckebrotsaege ปีที่แล้ว +5

      @@Coder_Tavi links get censored by YT (only the poster can see it, nobody else), which might explain why it's showing "2 replies" yet only one shows up

    • @Archimedes.5000
      @Archimedes.5000 ปีที่แล้ว +3

      It was TweetDeck not Twitter as far as I know

  • @苾
    @苾 ปีที่แล้ว +287

    NTTS is a youtuber I actually like to watch nowadays, even tho its about subjects I don't even know much about or affects me

    • @ItzStardustYT
      @ItzStardustYT ปีที่แล้ว +21

      @@stavratum 💀

    • @izzyxvibes
      @izzyxvibes ปีที่แล้ว +14

      @@stavratum if u don’t care then why’d you respond

    • @苾
      @苾 ปีที่แล้ว +1

      @@izzyxvibes cause he is a fan

    • @KhAnTlol
      @KhAnTlol ปีที่แล้ว +5

      @@stavratum we don't care that you don't care

    • @inspektor66
      @inspektor66 ปีที่แล้ว

      @@stavratum you seem like an angsty teenager with a "p" addiction.

  • @Willie-2024
    @Willie-2024 ปีที่แล้ว +508

    Someone, please make this man a Discord Mod. He does figure out more than discord itself.. Hats off man. Love from India

    • @clouderino
      @clouderino ปีที่แล้ว +96

      NO OH GOD PLEASE DONT MAKE HIM A DISCORD MOD I DONT WANT TO BE HIS KITTEN

    • @neanni
      @neanni ปีที่แล้ว +3

      ​@@clouderinospooky

    • @itsarian.
      @itsarian. ปีที่แล้ว +31

      WHY ARE INDIAN PEOPLE EVERYWHERE LITERALLY EVERY COMMENT I SEE IT SAYS "LOVE FROM INDIA" AT THE END

    • @justaweeb14688
      @justaweeb14688 ปีที่แล้ว +16

      @@itsarian. because they had too many kids

    • @justaweeb14688
      @justaweeb14688 ปีที่แล้ว +3

      Why tf you insulting him for? Why do you want him to be a discord mod?

  • @ItzStardustYT
    @ItzStardustYT ปีที่แล้ว +53

    Discord messed up??!?! No way! Impossible!

    • @Prouf1
      @Prouf1 ปีที่แล้ว +1

      -_-

    • @ezioboiz-ieatchildren-
      @ezioboiz-ieatchildren- ปีที่แล้ว +1

      Who could have guessed???

    • @joelhoon1707
      @joelhoon1707 ปีที่แล้ว

      This is the first time this has happened in so long, I forgot Discord ever messed up!!!!!

  • @sluuuudge
    @sluuuudge ปีที่แล้ว +158

    I’m honestly astounded that in 2022, Discord of all companies managed to accidentally create an XSS exploit.

    • @DMack6464
      @DMack6464 ปีที่แล้ว +5

      Well Google had one, so why stop the incompetence there?

    • @testuser1235
      @testuser1235 ปีที่แล้ว +1

      Bro u clearly know nothing.
      1. They didnt create an XSS Exploit, a person which found the vulnerability created the exploit
      2. Even in Google, Nvidia, Apple etc. are xss, and even more dangerous vulnerabilities (like ssrf, or with that RCE) found (daily), so pls dont just talk shit about discord, when u clearly know nothing about this topic.
      Look at for example Hackerone and see how many reports are daily submitted and resolved.

    • @sluuuudge
      @sluuuudge ปีที่แล้ว +1

      @@testuser1235 I ain't your "bro", either way you're still incorrect. Discord developed the application therefore they created the exploitable surface. Perhaps I didn't make that part of my comment clear.
      I'm not sure why you're white knighting Discord as if they're gonna give you a job for defending them...

    • @testuser1235
      @testuser1235 ปีที่แล้ว +3

      @@sluuuudge nah, im Not defending them, but I just can‘t stand people who think, Discord is the only Company who has vulnerabilities like that.

    • @un1que730
      @un1que730 ปีที่แล้ว +1

      @@testuser1235 discord is the one company getting fame astoundingly fast ,with mass comes critics

  • @zephyrprime8
    @zephyrprime8 ปีที่แล้ว +23

    Discord try not to create a security vulnerability with every new feature challenge (impossible)

  • @uhKilz
    @uhKilz ปีที่แล้ว +38

    I appreciate you making these videos. I love waiting to get into a MW2 match and watching discords biggest mistakes.

    • @jn567
      @jn567 ปีที่แล้ว

      MW2?

    • @Likemea
      @Likemea ปีที่แล้ว +1

      @@jn567 Modern Warfare 2

    • @uhKilz
      @uhKilz ปีที่แล้ว +6

      @@jn567 jc isn’t really a gamer if he doesn’t know what modern warfare 2 is

    • @ezioboiz-ieatchildren-
      @ezioboiz-ieatchildren- ปีที่แล้ว

      @@uhKilz facts, he's probably 9 years old and plays Minecraft.

  • @debargha0_0
    @debargha0_0 ปีที่แล้ว +51

    Looks like $800K wasn't that much for Discord, they should be again fined

  • @nclsDesign
    @nclsDesign ปีที่แล้ว +25

    The only vulnerability that's more unforgivable than XSS is SQL injections...
    That this happened to a big company like Discord is even worse...

  • @cenniebeanie
    @cenniebeanie ปีที่แล้ว +18

    there should be (again) in the title 😂

    • @TomJ211
      @TomJ211 ปีที่แล้ว +1

      Lol

  • @MrFilgueiras.
    @MrFilgueiras. ปีที่แล้ว +10

    Following this logic, the next exploit is gonna be "someone accidentaly typed 'DROP DATABASE discord' oops"

    • @williamdrum9899
      @williamdrum9899 ปีที่แล้ว +2

      Or used "gets(password)"

    • @SamuelLing
      @SamuelLing ปีที่แล้ว

      IIRC they use nosql database, it would be impossible for that to happen, but xss, yea, those are different

  • @trollify2851
    @trollify2851 ปีที่แล้ว +19

    Thank you for sharing this important information about the Discord NFT scam link. Your video is helping to educate and protect the community. Keep up the good work in raising awareness about these types of threats

  • @Arylist
    @Arylist ปีที่แล้ว +15

    I'm happy that I never fell for this scam because I got a lot of these DMs but I just ignored them.

    • @tristanrhodes2789
      @tristanrhodes2789 ปีที่แล้ว

      i accidentally fell for one before like a month ago XD now im worried

    • @IllagerCaptain
      @IllagerCaptain ปีที่แล้ว +1

      @@tristanrhodes2789 change your password if you haven't already.

    • @tristanrhodes2789
      @tristanrhodes2789 ปีที่แล้ว

      @@IllagerCaptain Yeah i did but that isnt the issue they have my account token not my password XD

  • @SupaMC_Gaming
    @SupaMC_Gaming ปีที่แล้ว +9

    Thank you for bringing this to light. You’re one of my favorite TH-camrs

  • @SavageMudkip
    @SavageMudkip ปีที่แล้ว +66

    damn bro thats crazy, they only did a minor felony this time?

  • @Trigger4589
    @Trigger4589 ปีที่แล้ว +139

    NTTS, you covered this so well!
    * I don't feel sorry for the idiots that have a lot of money I guess.

    • @ShadowOcto
      @ShadowOcto ปีที่แล้ว +27

      They’re NFT bros, don’t 💀

    • @Starlightnova111
      @Starlightnova111 ปีที่แล้ว +5

      What the guy above me said

    • @apyr1055
      @apyr1055 ปีที่แล้ว +1

      What the guy above the guy above me said

    • @Memezuii
      @Memezuii ปีที่แล้ว +1

      What the guy above the guy above the guy above me said

    • @DaniZeAlmighty
      @DaniZeAlmighty ปีที่แล้ว +1

      What the guy above the guy above the guy above the guy above me said

  • @k.silverpoint
    @k.silverpoint ปีที่แล้ว +35

    This is as good as a reminder to everyone to SANITIZE YOUR INPUTS.

    • @QUASAR098
      @QUASAR098 ปีที่แล้ว +1

      xkcd reference

    • @JaivianDean
      @JaivianDean ปีที่แล้ว +4

      @Jimmeh make inputs(what they user types in a text box) basically only work for the purpose you give them, no funky business, lol

    • @mousepotatoliteratureclub
      @mousepotatoliteratureclub ปีที่แล้ว

      @@QUASAR098 Happy holidays to Bobby Tables

    • @williamdrum9899
      @williamdrum9899 ปีที่แล้ว +1

      @@jimmydabear Design your website so that if the user types in computer code instead of a password their code doesn't get run.

    • @maskettaman1488
      @maskettaman1488 ปีที่แล้ว

      This has nothing to do with input sanitation lmao

  • @Bockanator
    @Bockanator ปีที่แล้ว +6

    my face when discord's website is vulnerable to the simplest Cross site scripting imaginable.

  • @frostdesigns555
    @frostdesigns555 ปีที่แล้ว +2

    As someone that is still learning web development, this stuff kinda scares me. My knowledge on network security as well as vulnerability detection is not that much yet.

  • @Respectable_Username
    @Respectable_Username ปีที่แล้ว +4

    This is why you gotta set your CSP headers. Even if somebody messed up the actual code itself, a good CSP will stop it from actually doing any harm!

    • @Naleksuh
      @Naleksuh ปีที่แล้ว

      I'm pretty sure the reason they were embedding the script off TH-cam was because of the CSP. So no, CSP would not have stopped it

  • @timedeos4320
    @timedeos4320 ปีที่แล้ว +2

    I found someone that’s been doing this to get people’s tokens and selling their tokens since the QR code scam, I’ve always thought this was possible but never had a sample to work with like you did, good job man!

  • @comet.x
    @comet.x ปีที่แล้ว +6

    i didn't even know what this was called but as soon as i saw the html i knew exactly what was going on.
    like no way did they let you just write html in a text description like that

    • @williamdrum9899
      @williamdrum9899 ปีที่แล้ว +1

      That's like a fox guarding the henhouse

  • @shidosensei.
    @shidosensei. ปีที่แล้ว +4

    Thanks for letting us know man, I hope you stay safe out there

  • @Awesome_Aasim
    @Awesome_Aasim ปีที่แล้ว +3

    A few years ago a security researcher found an XSS vulnerability in TweetDeck and used it to make the only self retweeting tweet.

  • @yuvalne
    @yuvalne ปีที่แล้ว +1

    man, the last time I saw such a major and easy xss vulnerability was xss in tweetdeck 8 years ago. and that was just a self-retweeting tweet.
    such incompetence.

  • @darthvader8744
    @darthvader8744 ปีที่แล้ว +10

    The moment I hear "This was against NFT groups" I immediately agree with the exploiters

  • @rickytheraccoon6102
    @rickytheraccoon6102 ปีที่แล้ว +2

    Sucks that it happened, but at least it was a bunch of crypto nerds and not actual human beings

    • @williamdrum9899
      @williamdrum9899 ปีที่แล้ว

      That's a bit harsh. I don't even do crypto

  • @twilighttales-
    @twilighttales- ปีที่แล้ว +10

    That cherry server really went through a lot of pain mainly thier owner🤣🤣🤣

    • @twilighttales-
      @twilighttales- ปีที่แล้ว +1

      Abee 👁 👁 😂
      👄

    • @jalkarna
      @jalkarna ปีที่แล้ว

      @@twilighttales-kya bol raha hai bhai

  • @BeastGamingHD
    @BeastGamingHD ปีที่แล้ว +1

    I think what's crazy is that people are just now figuring out about this exploit which has actually been around for nearly 2 years now.
    Also most of the people hijacking accounts are focusing on people with og or "leets" for username and account age so that they can keep it and or sell it. A "leet" would be a username like root#0001 for example.

  • @_kzr
    @_kzr ปีที่แล้ว +3

    i’m genuinely surprised this was overlooked, literally no validation checks or encoding on the html to make sure that scrips aren’t being executed.. it’s unsurprising coming from discord though

    • @_kzr
      @_kzr ปีที่แล้ว

      @@zydn it’s discord 😂 they always find a way to make something worse

    • @NicoPlyley
      @NicoPlyley ปีที่แล้ว

      @@zydn Yes that’s true when using JSX. But this exploit was done through the state management software. When someone loads the page it get exploited before the page even renders out html. If it was in the JSX it would have been sanitized

    • @hi-kt3qr
      @hi-kt3qr ปีที่แล้ว

      @@zydn React takes some steps to protect against simple xss attacks and html input vector rendering. displaying script tags, for instance, or other things. The exploit in this case is trickier than you might expect because it only guards against DOM-based XSS assaults, although XSS comes in a variety of forms. Having said that, data sanitization might have easily avoided this.

  • @MightyDantheman
    @MightyDantheman ปีที่แล้ว +1

    This is why I stay logged out in my browsers

  • @Leep226
    @Leep226 ปีที่แล้ว +3

    Fantastic video to inform us all about it but to be honest if you just stick to the rule of never clicking on any links before asking around or anything is the safest way to go
    Do not let your curiosity or greed get the better of you as those are usually how you fall for any scams
    Always ask yourself what could happen or simply why do I have to click on something someone sent me in dm which I have never spoken to before.
    Always have a certain level of distrust as come on this is the internet unless you know them personally irl you should always that certain level of awareness as anything could happen such as even your best friend on internet for years could turn on you for personal benefits

  • @TS_Mind_Swept
    @TS_Mind_Swept ปีที่แล้ว +1

    This is why you don't click links. Even if it's from someone you think you know, try to engage them in a conversation (esp if you haven't heard from them in a minute); if they talk different than normal, you know

  • @Knaeckebrotsaege
    @Knaeckebrotsaege ปีที่แล้ว +4

    brainfart: could people theoretically spam the blueh and/or hawkemedia links with fake/random tokens via scripts to throw some sand in their gearbox? obviously not all from the same IP so it's not as easy for them to filter out. they'd have to figure out if the tokens they collected are actually valid, and i guess would be kinda pissed if 99% aren't lol 🤔

  • @PinkManGuy
    @PinkManGuy ปีที่แล้ว +2

    A friend of mine lost his account to this. Luckily we were able to recover it, but it was scary for a while there.

  • @Dyanosis
    @Dyanosis ปีที่แล้ว +4

    This shows how little testing they have. If they'd had more testing, especially for such a simple webpage, this would have never made it to live.
    Xss is very simple to prevent and, as many people have posted many times before, is very simple to escape a user's input.
    Apparently Discord doesn't know/follow the "never trust user input" rule.
    Also, with Discord being as big as it is, you'd think they'd do vulnerability testing that would have told them about this problem long before it got out of dev.

  • @Jazztache
    @Jazztache ปีที่แล้ว +4

    This is why it's a good idea to use Element instead, Discord just keeps on getting these weird instabilities.

    • @Jazztache
      @Jazztache ปีที่แล้ว +1

      @C00L3R Not really. It's like saying Slack is *just* for companies.
      The only companies on Element in my vicinity is the company of the lads.
      Also, with Guilded... Roblox Corporation. Enough said.
      Plus, it's free (libre) and open source, which should be the norm for communications/chat apps.

  • @Vlame
    @Vlame ปีที่แล้ว +3

    To be honest, I'm not even suprised anymore that Discord has another exploit. If they fix one, someone will find another one 😅

  • @NiftRex
    @NiftRex ปีที่แล้ว +1

    This happened to me. I got offered to be paid to "test" a service or something similar and be invited to a server. I just simply ignored those DMs. They were persistent and would try one or two more times, I still never clicked on them.

  • @sctjkc01
    @sctjkc01 ปีที่แล้ว +1

    Stealing a Discord token is incredibly bad. If you lose the token and the recipient has any sort of scripting set up, you can expect to have the entire account stolen inside of 30 seconds.
    I'd fallen for a phish where I was asked to test a game distributed over Itch. It stole my Discord token from my Discord desktop client, logged me out, and closed the client.
    And despite having 2FA on my account, I was unable to log back in again, as the token thief managed to strip 2FA AND change the password AND change the email address on it. Without any sort of request for 2FA tokens from my phone or passwords.
    I'd asked Discord support over Twitter for assistance, and they'd reverted the email address back to mine... but presumably the token never got reset or the token stealer was still running on my machine, because it was stolen and yanked away from me yet again.
    And yes, I was a paying Nitro user with saved payment information. Thankfully, because I paid via PayPal, I was able to tell PayPal to never send any money toward Discord and saved myself ~US$150 of fraudulent purchases.

  • @Madison1676
    @Madison1676 ปีที่แล้ว +22

    Keep slaying no text to speech

    • @andistive
      @andistive ปีที่แล้ว +4

      SLAY QUEEN 💅💅💅💅💅💅💅💅💅💅

  • @fcantil
    @fcantil ปีที่แล้ว

    that's crazy. well on the slightly bright side, at least it's fixed now...

  • @bruisedbug
    @bruisedbug ปีที่แล้ว +1

    im not a security engineer or anything, but didnt this exact same thing happen with Flash? Like this is one of the most simplest things to avoid.

    • @alex59292
      @alex59292 ปีที่แล้ว +1

      Yes xss is literally thought in schools, that's how basic it is to do

  • @Sopitive
    @Sopitive ปีที่แล้ว +4

    It is possible to do a lot of input sanitization, CORS policy changes and CSP changes to circumvent a lot of XSS, but in the end you probably won't get everything. Hackers will reverse a site and try to find a bypass to the filter you set in place. It isn't necessarily Discord's fault because it took hackers this long to discover it. It just goes to show that nothing you do as a security researcher and engineer will truly patch a vulnerability fully, but instead just makes it harder for a hacker to exploit it. Discord does have a bug bounty, but if crypto scams will yield more money than the reward money from the bug bounty, it makes more sense for hackers to exploit it rather than responsibly disclosing it.

    • @JaivianDean
      @JaivianDean ปีที่แล้ว +1

      this is a new feature that just came out with discord that got XSS'ed

    • @Sopitive
      @Sopitive ปีที่แล้ว +1

      @@JaivianDean Even then, reflected XSS is one of the least serious types of XSS. If it were to have been stored XSS, we would have had a huge problem (worse than this one). This still required a little social engineering and user interaction to pull off. Though that kinda makes sense, they should have probably checked for something like that before they pushed an update.

    • @blenderbachcgi
      @blenderbachcgi ปีที่แล้ว

      Like I said, the only way to stop this, is to deal with the hackers one on one. Trying to patch up a broken wall, to hide from them, is only delaying the inevitable, because they will ALWAYS find you. Sadly, everyone chooses to literally allow them to do these things.

    • @SamuelLing
      @SamuelLing ปีที่แล้ว

      @@Sopitive or just be smart, don’t click on those links, if you want do it in a incognito mode or a vm (though, this is not really practical)

  • @wolfypro
    @wolfypro ปีที่แล้ว

    Your videos are getting better & better! I follow you since you had 50k subs. Great job!!

  • @rtzgf67games7
    @rtzgf67games7 ปีที่แล้ว +6

    I can't believe that discord forgot about it! It's legit on the OWASP top 10 web app vulnerabilities. A lot of these big companies forget about web app security 101 and it's sad.

    • @maskettaman1488
      @maskettaman1488 ปีที่แล้ว

      They outsource things like frontend to their diversity-hire tokens or to overseas workers entirely. Many major companies do it. It's why websites like TH-cam and Discord are getting progressively worse and worse from an interface perspective

  • @xyhasanamazingalt9583
    @xyhasanamazingalt9583 ปีที่แล้ว +1

    it’s insane discord never patched this, i literally used it in 5th grade to mess with my friends on websites they made

  • @fractal6929
    @fractal6929 ปีที่แล้ว +13

    these security exploits are really making guilded look like a feasible option

    • @luviana_
      @luviana_ ปีที่แล้ว +4

      Guilded is owned by Roblox.
      Don't move to an equally trash platform. Pick something open source, like Element or Signal

  • @corn738
    @corn738 ปีที่แล้ว +6

    I really hope you get to be a discord mod. You do more than the discord staff at this point. PLEASE LET ME BE YOUR KITTEN 😳😳😳

    • @vilact0
      @vilact0 ปีที่แล้ว +3

      what the hell

    • @williamdrum9899
      @williamdrum9899 ปีที่แล้ว

      Took me a minute to get that reference

  • @ImDuck42
    @ImDuck42 ปีที่แล้ว

    That with the worm is talked about with interview on darknet diarys

  • @ms.awesome
    @ms.awesome ปีที่แล้ว +1

    i remember when tweetdeck had a xss self retweeting tweet a long time ago. How so many people don't see this issue with their websites is crazy to me

  • @Nicknero
    @Nicknero ปีที่แล้ว +1

    Moral of the story: STOP... CLICKING... RANDOM... LINKS...
    Kthx

  • @MalwareTheHunter
    @MalwareTheHunter ปีที่แล้ว +1

    I see everyone hating on discord. I am a bug bounty hunter and we gotta understand that all of us are humans, everyone makes mistakes, way bigger companies are getting hacked daily with way stupider vulnerabilities and you gotta remember there are millions of places where you have to check for vulnerabilities. Of course it sounds stupid that it had such a stupid vulnerability because it was found and sounds like ‘holly shit everybody could find it’ it’s actually not working like that 😂

  • @Mikasks
    @Mikasks ปีที่แล้ว

    The junior developer who wrote that: oops.. 👀

  • @skylark.kraken
    @skylark.kraken ปีที่แล้ว

    With modern JS frameworks the threat of XSS is lessened. React makes it obvious when you might have issues by making you type out "dangerouslySetInnerHTML" when you're doing something that is likely dumb. In React if you pass a "" to anything else it will be interpreted as text. This makes developers less aware of threats because XSS hasn't been a concern to them, until there's SSR and the browser is no longer told to interpret "" as text but it looks like it should be an element. It's super simple to avoid, but at the same time it's easy for developers to forget that it's a concern.

  • @kateaplus
    @kateaplus ปีที่แล้ว +1

    literally 101 stuff at that level

  • @410Here
    @410Here ปีที่แล้ว +1

    how on earth do they not endlessly dom-purify the shit out of everything user generated?

  • @Wirby.
    @Wirby. ปีที่แล้ว

    Funny how I got a discord ad at the start

  • @beyem6377
    @beyem6377 ปีที่แล้ว

    So glad I've been sick the last few days

  • @Deimos001
    @Deimos001 ปีที่แล้ว

    Well it's like some say "one's man's trash,another's trash"

  • @siomek101
    @siomek101 ปีที่แล้ว +1

    "Discord messed up server discovery" - i already thought about xss

  • @orngng
    @orngng ปีที่แล้ว +2

    These vulnerabilities look as bad as the ones on the Roblox website lol

  • @Dolphin002
    @Dolphin002 ปีที่แล้ว +1

    Even I, someone who makes tiny Github websites with no actual security risks, patch XSS. How did Discord forget?

  • @Squ_iddy
    @Squ_iddy ปีที่แล้ว

    Honestly nevermind the NFT and cryptobros, this could've been a lot worse and the lack of transparency about it is kinda unsettling

  • @decayedargon6765
    @decayedargon6765 ปีที่แล้ว +1

    Sometimes, it's the implementation of XSS prevention which is vulnerable. There was evidence of existing XSS prevention in the audit that was made. Don't flame them too hard.

  • @natec1
    @natec1 ปีที่แล้ว

    That’s really really bad. The fact that this is even a possibility in this day and age is insane

    • @blenderbachcgi
      @blenderbachcgi ปีที่แล้ว +2

      It wouldn't have been a thing in this day and age if we'd gotten rid of the hackers a long time ago. But we don't. We just keep gluing a cracked wall together with raisins and mud hoping that someone can't just bust it down and get to you.

  • @thecwd8919
    @thecwd8919 ปีที่แล้ว

    I like how they're just using a default nginx forbiden page like "damn this is so easy we dont even need to make it look like its not a scam!"

  • @Penguin_Spy
    @Penguin_Spy ปีที่แล้ว +2

    ok so a bunch of people are saying stuff about React or DOMPurify, but what it looks like actually happened is they literally inserted the user-generated text INSIDE a script element before running it (either serverside or with .unsafeHTML). this is because the first part of the visible script we see is an end-script tag, so the injected script first needs to end the real discord script element (to avoid syntax errors), start its own with the token stealing, and then end it's and start a new one for the rest of discord's script.
    this is literally the MOST OBVIOUS xxs i've EVER SEEN, its literally fucking inserting text _from the user_ IN THE MIDDLE OF YOUR JAVASCRIPT literally wtf discord

    • @williamdrum9899
      @williamdrum9899 ปีที่แล้ว

      So it's basically the classic '); DROP TABLE x --; trick

  • @Lunariahh
    @Lunariahh ปีที่แล้ว +1

    i don't even know coding and it looks really simple actually
    basicly after joining, it should run that script mentioned in 1:46, and then that redirects your token to alot of sites (and probably, the hackers site) and simply, steals your account

    • @antehll
      @antehll ปีที่แล้ว +1

      mostly right, but the code execution has to do with rendering the page. from what i googled about this, they first get all the data and descriptions including that code snippet from their server. then they send back an HTML file text string for you to render on your client, which has the data inserted. but since it's directly pasted into the html script tag part, you can pretend you're part of the website asking for the token by writing your own html script. the site can't tell the difference between your custom code and theirs because again, it's pasted directly inside allowing you to transform the html as you please

    • @Lunariahh
      @Lunariahh ปีที่แล้ว +1

      @@antehll ohhhh i get it

  • @NoMerCyNL
    @NoMerCyNL ปีที่แล้ว

    Thanks for the information, Shared in my discord server

  • @mu11668B
    @mu11668B ปีที่แล้ว +1

    Whoa! Some classic XSS just became a 0-day on Discord. How unexpected! 😂

  • @CaptainMonkeyFez
    @CaptainMonkeyFez ปีที่แล้ว

    Bobby Tables would be proud... or maybe disappointed.

  • @Aquilz.
    @Aquilz. ปีที่แล้ว

    the light mod thumbnail BRUHHH

  • @morgandraegar7301
    @morgandraegar7301 ปีที่แล้ว

    Nobody's perfect, accidents happen, live and learn.
    But seriously, they better fix their schitt.

  • @Noob-gx6yf
    @Noob-gx6yf ปีที่แล้ว +1

    Another day, another scammer heist. On Discord ofcourse!

  • @ReadySteadyVon
    @ReadySteadyVon ปีที่แล้ว +1

    Brother, in programming, mistakes happen. Maybe it was an issue with version control or some overworked tired guy put in a typo or pressed a wrong switch.
    I would not go as far as throwing shade on the people that messed up; that's not productive to begin with. Instead, Discord staff should be encouraged to look into this issue and to help them with documentations to explain how to correct this mistake (if they didn't knew to begin with), which is what that twitter user did.

    • @alex15095
      @alex15095 ปีที่แล้ว +3

      XSS injection is one of the most basic vulnerabilities that should always be tested against. Security against it is built into most modern frameworks, for example with React the only way to make it vulnerable is to use a feature named `dangerouslySetInnerHTML`. I have no idea how they made this mistake unless they invented their own broken framework they didn't think to test, or they made so many bad decisions that they were actually using dangerouslySetInnerHTML in production.

  • @mat_name_whatever
    @mat_name_whatever ปีที่แล้ว

    It's stupid that Discord did that, but it is also astounding that redux put the vulnerable code on their website, with only a comment in the snippet saying "hey check this link for security issues", instead of including the two function calls that make it safe. And then I wonder why Discord server side renders/ templates it in there in the first place, js can access the query param itself...
    Truthfully as a developer I have to say that unfortunately I have had many less than competent colleagues, and combined with pressure and negligence from management that has lead to very similar and worse issues a number of times. These issues don't come out of nowhere.

  • @micamaster100
    @micamaster100 ปีที่แล้ว

    I swear my account one got hacked, and it did something worse than take my money.
    It blocked all my friends, while sending them a false hate message!
    Im better now, and yes it was the QR code thing

  • @sumoddball
    @sumoddball ปีที่แล้ว

    Where's my "I love you bye bye!" 😭best part of your videos.

  • @tacticalpowered
    @tacticalpowered ปีที่แล้ว +1

    It probably got in their DB, and then the page just loaded the values from their DB, which they did not sanitize properly. Kinda makes you wonder if the server is even verifying input properly before posting data in the database.. SQL Injections..

  • @masterdementer
    @masterdementer ปีที่แล้ว +1

    Your discord token will automatically change within 6-8 hours I think or maybe 12. It doesn't stay the same forever. They can send automated requests using that. But they can't change your password or access the full discord account. Unless they know the Server ID, Channel ID in which they want to send the message in. So they would have that info probably of only one server in which you were with the guy that sent you the link.

    • @ulize.
      @ulize. ปีที่แล้ว

      Two wrongs in this message. Firstly, the Discord token does not expire until you change your password or change two-factor authentication settings. Secondly, you are able to access the full account, it's very simple to log into an account using the token. Don't spread false security tips, it helps no one

  • @ali-1000
    @ali-1000 ปีที่แล้ว +1

    LOL, how ironic that hackers are stealing discord tokens, yet they couldnt be bothered to update their version of nginx (which is old and very insecure)

  • @otter502
    @otter502 ปีที่แล้ว +1

    Idea: use python / Java scripts to spam send http requests with BS tokens to make it so they have to check each

  • @thebluehatcrew
    @thebluehatcrew ปีที่แล้ว

    Hawks media just sues meta tags to make it redirect to a different site.

  • @rohansampat1995
    @rohansampat1995 ปีที่แล้ว +1

    Coool, I

  • @sothesalamilidwontfit
    @sothesalamilidwontfit ปีที่แล้ว +1

    how is discord so shitty that there are 392829 ways to get a totally well protected and hidden token that can access your entire account

  • @AdianAntilles
    @AdianAntilles ปีที่แล้ว

    What one could do in case of these dead ends mentioned in the video, it is always possible to look where the servers are hosted and what they are doing with them. ping, traceroute and nmap are your friends.

  • @curtispritchard5938
    @curtispritchard5938 ปีที่แล้ว +1

    How the hell does a junior developer like myself understand how to prevent xss better than discord. This honestly screams of gross negligence and laziness

    • @SamuelLing
      @SamuelLing ปีที่แล้ว

      Even if you prevented it, sometimes xss prevention itself is a flaw, there are nearly infinite ways where a input can be sanitized, it’s a even in a good system, it’s a matter of time where it’s bound to happen

  • @user-tr2dh4xx6u
    @user-tr2dh4xx6u ปีที่แล้ว

    Wow I was wondering all the warnings saying not to click links lmao

  • @EpicLPer
    @EpicLPer ปีที่แล้ว +1

    Mean, if NFT bros mainly got hit guess congrats.

  • @NeuralSensei
    @NeuralSensei ปีที่แล้ว

    I was planning to use discord login built into opera gx to use alt account from the main program, but this seems like such a big security flaw now

  • @1ch0r41
    @1ch0r41 ปีที่แล้ว

    I was around the hacking space when this vulnerability was found. My friend tested it on me and we thought it was a cool little gimmick but nothing worth using against anyone except enemies. That was 6 years ago I believe, if it’s really been this long and they haven’t patched it, that’s extremely sad. Honestly a low level exploit as well.

  • @jadelily18
    @jadelily18 ปีที่แล้ว

    i feel so bad for the people who had their accounts stolen but holy fuck is that funny lmao. It's such an easy thing to fix and I don't know how it's ever a thing in 2022