What CVE should I use for the Polyfill[.]io supply chain attack? I see that CVE-2024-38526 exists, but it's specifically for pdoc. Is there a better one?

#PolyfillIO #CVE #infosec

Y'all remember #PolyfillIO?

I realize the lesson there is; don't depend on code from domains you don't control, and in an ideal world that's what you should do

But is there still a need there? Are there #webPlatform features you'd like to use but you don't want to introduce a build process just to bundle the #polyfill from #NPM?

Or is there no point in #polyfills since #browsers don't share caches between origins these days so there's no precaching benefit anymore?

#webDev #javaScript #web

So, I'm thinking; what if I build polyfill.io, but on the Blockchain! Hey come back..

Hear me out; #fleekfunctions are immutable, and transparent. So long as the #fleeknetwork nodes can be trusted to execute the code properly (I presume there are cryptographic guarantees of output validity) then it could be safer from supply chain attacks.

#webDev #polyfillio #polyfill #supplyChain #hacking #web3 #blockchain #fleek #javaScript

On July 5th, PolyfillIO switched to polyfill[.]top
This domain is currently unblocked by uBlock Origin and all major blocklists.
Tweet: https://x[.]com/Polyfill_Global/status/1809122842145141114
Thread with more information and also making fun of Windows users.

#PolyfillIO #PolyfillIOAttack

384,000 sites pull code from sketchy code library recently bought by Chinese firm | @dangoodin

A supply-chain attack on Polyfill.io, a #JavaScript library, redirected users to malicious sites. So far, bootcss.com is the only domain showing any signs of potential malice. The nature of the other associated endpoints remains unknown

#CyberSecurity #SupplyChainAttack #WebDevelopment #WebProgramming #WebSecurity #Polyfill #PolyfillIO

https://arstechnica.com/security/2024/07/384000-sites-link-to-code-library-caught-performing-supply-chain-attack/

384,000 sites pull code from sketchy code library recently bought by Chinese firm

Many website admins, it seems, have yet to get memo to remove Polyfill[.]io links.

Ars Technica

> #China-based company #Funnull acquired the domain and the GitHub account that hosted the #JavaScript code. On June 25, researchers from #security firm Sansec reported that code hosted on the polyfill domain had been changed to redirect users to adult- and gambling-themed websites. The code was deliberately designed to mask the redirections by performing them only at certain times of the day and only against visitors who met specific criteria.

https://arstechnica.com/security/2024/07/384000-sites-link-to-code-library-caught-performing-supply-chain-attack/

#polyfillio #supplyChain

384,000 sites pull code from sketchy code library recently bought by Chinese firm

Many website admins, it seems, have yet to get memo to remove Polyfill[.]io links.

Ars Technica

If you're using #polyfillio code on your site โ€“ like 100,000+ are โ€“ remove it immediately

https://www.theregister.com/2024/06/25/polyfillio_china_crisis/

If you're using Polyfill.io code on your site โ€“ like 100,000+ are โ€“ remove it immediately

Scripts turn sus after mysterious CDN swallows domain

The Register
JavaScript-Service Polyfill.io: 100.000 Sites binden Schadcode รผber CDN ein

Mehrere Sicherheitsforscher melden eine aktive Bedrohung durch das Content Delivery Network von Polyfill.io. Google sperrt Werbung von betroffenen Ads-Seiten.

heise online
Polyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operator

The recent large scale supply chain attack conducted via multiple CDNs, namely Polyfill.io, BootCDN, Bootcss, and Staticfile that affected up to tens of millions of websites has been traced to a common operator. Researchers discovered a public GitHub repository with leaked API keys helping them draw a conclusion.

BleepingComputer

> The recent large scale supply chain attack conducted via multiple CDNs, namely Polyfill.io, BootCDN, Bootcss, and Staticfile that affected anywhere from 100,000 to tens of millions of websites has been traced to a common operator

> Researchers discovered a public GitHub repository where the purported operators of Polyfill.io had accidentally exposed their Cloudflare secret keys.

LOL, FAIL!

https://www.bleepingcomputer.com/news/security/polyfillio-bootcdn-bootcss-staticfile-attack-traced-to-1-operator/

#polyfill #polyfillio #cloudflare #bootcdn #bootcss #staticFile #security

Polyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operator

The recent large scale supply chain attack conducted via multiple CDNs, namely Polyfill.io, BootCDN, Bootcss, and Staticfile that affected up to tens of millions of websites has been traced to a common operator. Researchers discovered a public GitHub repository with leaked API keys helping them draw a conclusion.

BleepingComputer