a random operate banner

/operate/ - Endchan Operations

Let us know what's up


New Reply on thread #29851
X
Max 20 files0 B total
[New Reply]

Index | Catalog | Banners | Logs
Posting mode: Reply [Return]


thumbnail of endchan_knight.jpg
thumbnail of endchan_knight.jpg
endchan_knight jpg
(88.46 KB, 700x700)
Endchan Hacked

Yesterday (2026 February 11) users exploited a bug in the engine and escalated privileges on user accounts. They gained "root" access to the site, getting the highest privilege, which means they could see user's IPs of all the posts, change site settings, lifting range bans, delete threads and posts.
The real problem from the above is the IPs, which could help breaking anonymity of the users.
It seems they had no access to the database so for example they couldn't get to email addresses of registered users. Other than these two types of data, there is not much else to gain.
We found and patched the bug. We are still auditing the logs and the engine, if new information emerges, we'll share it.

Maybe this event means a hit for the site's reputation, but now we can tell that we are on the same level as 4chan. Though at least it is still not 4chan.

No role signo competence is showing.




 >>/29851/
Two notes:
1. "root" is not the server root. The site engine calls the top role - above the admin - as root. See the Moderation Manual of Endchan. The "root" role allows access to Endchan's moderation pages with Root privileges, which comes with what I wrote in OP.
2. passwords are stored hashed, and similarly to emails that would have needed access to the database itself.


 >>/29857/
ChatGPT.

I noticed new commits for lynxchan and saw that the fork for endchan was last updated in 2020. Gross negligence if I dare say so. If I didn't turn every global volunteer into a "root", they probably wouldn't have noticed it at all lul





 >>/29861/
> I did the hack to get the IP's so I can sell the data on the dark web. I
That's going to bring millions, if not billions! Did you get the public or the private IPs? I heard the private ones are hard to route.





Why are you still running this site you useless retards? 2 years ago you let people upload custom css that could be used to get lurkers ip addresses with ip grabbers and now your entire site got hacked. You're low iq and can't run a site properly and you don't give a shit about your users either. Take down this website if you have any dignity left. I recommend whoever reads this to stop using this website right now












thumbnail of role-escalation-log-sample.png
thumbnail of role-escalation-log-sample.png
role-escalation-... png
(41.82 KB, 403x487)
 >>/29879/
Several things to address and clarify in your question.
> period
The logs says first escalation was on 2026 February 11th at 12:44, which means we discovered it about 20 hours later. These logs are accessible from the home page, scroll down a lot.
> logs
There are more logs generated by the engine that aren't published to that page. These logs aren't accessible with global Root privileges, no option in the moderation view or elsewhere.
> views and downloads
The engine doesn't log views and downloads - it's stated in the FAQ too.
> IPs
As for the IPs. When a user is a board or global staff member he can see IP hashes (and ranges) at posts in thread moderation view. For Root, there's an IP instead. So if they wanted to get IPs they had to open each thread. In theory they could harvest with a scraper. I don't know if this was done or not.



thumbnail of 1.webp
thumbnail of 1.webp
1 webp
(26.02 KB, 640x678)
 >>/29880/
> superguy
This is hilarious. I imagine pic for some reason.

 >>/29882/
А он и не должен нести ответственность. Ты же не подписывал никакой договор, когда решил пользоваться этой бордой, по которому он бы нёс ответственность за сохранность твоих данных? Нет. Вот и всё. А что до морального аспекта, ему в Австралии / Новой Зеландии или где он там по большей части на это прохладно, я думаю. Лучшее что он может сделать в такой ситуации, это  >>/29875/ не допустить повторения чего-то подобного.

Также удвою  >>/29876/. Для polru-шизиков и люbbителей ПАВ это актуально как никогда, на любом ресурсе. Ответственность за человека в первую очередь несёт этот же самый человек, сам за себя, а не кто-то другой.

 >>/29880/
Thx for the clarifications.
Basically, root can see IPs of every post on Endchan, even the for the ones created many years ago.

> So if they wanted to get IPs they had to open each thread. In theory they could harvest with a scraper. I don't know if this was done or not.
Obviously this was the point.



Post(s) action:


Moderation Help
Scope:
Duration: Days

Ban Type:


0 replies | 0 file
New Reply on thread #29851
Max 20 files0 B total