The new Chinese owner of the popular Polyfill JS project injects malware into more than 100 thousand sites

0x815@feddit.org to Technology@lemmy.world – 899 points –
Polyfill supply chain attack hits 100K+ sites
sansec.io

Archived link

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. Any complaints were quickly removed (archive here) from the Github repository.

116

You are viewing a single comment

Not a solution. Much of the modern web is reliant on JavaScript to function.

Noscript made sense when the web was pages with superfluous scripts that enhanced what was already there.

Much of the modern web is web apps that fundamentally break without JS. And picking and choosing unfortunately won't generally protect from this because it's common practice to use a bundler such as webpack to keep your page weight down. This will have been pulled in as a dependency in many projects and the site either works or does not based on the presence of the bundle.

Not saying this is a great situation or anything, but suggesting noscript as a solution is increasingly anachronistic.

This will have been pulled in as a dependency in many projects and the site either works or does not based on the presence of the bundle.

This wasn't bundled. People inserted a script tag pointing to a third-party CDN onto their sites. The output changes depending on the browser (it only loads the polyfills needed for the current browser) so you can't even use a subresource integrity hash.

Much of the modern web is reliant on JavaScript to function.

“function” is doing a lot of lifting there. Trackers, ads, and assorted other bullshit is not the kind of functioning anyone needs.

It’s true the average user gets flummoxed quickly when the scripts are blocked, but they can either sink (eat ads and trackers) or swim (learn what scripts to allow). (Spoiler: they almost always sink)

Not a solution. Much of the modern web is reliant on JavaScript to function.

And much of it works better and faster without JavaScript. Some sites don't work in Noscript, but most sites run faster and work well enough.

I only allow JS on a whitelist.

A whitelist wouldn't mitigate this issue entirely due to bundling

In this case the script wasn't bundled at all - it was hotlinked from a third party CDN. Adding malicious code instantly affects all the sites that load it.

The output differs depending on browser (it only loads the polyfills your browser needs) so it's incompatible with subresource integrity.

Imo, computing, like all other things, requires a little trust and risk. The problem is most people are Wayyy to trusting in general.

15 more...