JavaScript service Polyfill.io: 100,000 sites embed malicious code via CDN

0
27
JavaScript service Polyfill.io: 100,000 sites embed malicious code via CDN


A recent supply chain attack has affected websites using the content delivery network (CDN) cdn.polyfill.io. Polyfills are used on the web to allow content to run on older browsers that do not support current functions.

Advertisement


Polyfills map unsupported APIs so that the application can run as well as possible in the browser. The goal of the Polyfill.io project The aim is to simplify integration by providing the necessary polyfills for the respective browsers.

In recent days, several security researchers have reported malicious code distributed via Polyfill.io. Apparently more than 100,000 sites around the world are affected.

Anyone whose web application has a dependency on the domain Polyfill.io should remove it immediately. The open source project itself is not affected, only the Polyfill.io site is affected.

DevSecOps and MLOps combined: JFrog acquires ML platform QwakDevSecOps and MLOps combined: JFrog acquires ML platform Qwak

both are fast as well as Cloudflare has been offering since February Alternatives to Polyfill.io’s CDN. The Readme is also available in German in the GitHub project There is a contradiction in the choice of domain: it declares that the project officially uses Cloudflare for CDN, but at the same time refers to the documentation on the polyfill.io website.

In February, the Chinese company Funull acquired the Polyfill.io site, originally backed by the Financial Times. The operator of the Polyfill project, Andrew Bates, who works at Fastly, called on X (formerly Twitter) to immediately remove the dependency on Polyfill.io.

At the time, the discussion was ongoing on an issue of the related GitHub project, which has since been removed Still viewable at the Wayback Machine web.archive.org,

Cloudflare warned in a company blog in late February Eliminating software supply chain risks and establishing an alternative CDN endpoint. fast prompt reply for potential danger.

It was also constructed at the same time Site Polykill.iowhich is dealing with the issue but has not yet resolved the existing malicious code reports.

Now, among other things, the blog of JavaScript security provider C/Side reports that cdn.polyfill.io is actively distributing malicious code. Apparently the content relies on HTTP headers, so it only activates on some mobile devices. According to the blog post Not only is the code obfuscated, but it also relies on lazy execution and other techniques to remain anonymous.



Both c/side and Sansec found a redirect to a sports betting site in code distributed via the Polyfill.io CDN.

(Image: C/Side)

Also security scanner providers Sansec warned in its blog Before the Polyfill supply chain attack. According to Sansec, Google is already blocking Google ads from sites that integrate Polyfill.io. The post also shows parts of the source code that uses a fake Google Analytics domain and redirects mobile users to a sports betting website.


(RME)

Photovoltaic self-consumption | Solar panels at home without investing a single euro: this is the disruptive model with which you can achieve itPhotovoltaic self-consumption | Solar panels at home without investing a single euro: this is the disruptive model with which you can achieve it

LEAVE A REPLY

Please enter your comment!
Please enter your name here