The new Chinese owner of the popular Polyfill JS project injects malware into more than 100 thousand sites

0x815@feddit.org to Technology@lemmy.world – 899 points –
Polyfill supply chain attack hits 100K+ sites
sansec.io

Archived link

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. Any complaints were quickly removed (archive here) from the Github repository.

116

You are viewing a single comment

One place I worked at recently was still using Node version 8. Running npm install would give me a mini heart attack... Like 400+ critical vulnerabilities, it was several thousand vulnerabilities all around.

Running npm install would give me a mini heart attack

It should; but more because it installs things right off the net with no validation. Consistency of code product is not the only thing you're tossing.

How else would you get LPAD ? Expect me to write 2 lines of code when I could just import a 100 Mb library to do it for me?

You need to get up to date from three years ago. NodeJS 16.20, or thereabouts, enabled dependency auditing by default.

I’m still fighting my engineers go get current enough to use this (but we do have a proxy artifact server that also attempts to keep downloads clean, and a dependency scanner)

If you're on RHEL 8+, you can install the latest version of node with dnf.

dnf install nodejs will likely install node 8 :(. Use dnf module install nodejs:20 to install the latest version.