#polyfillio

2024-10-09

What CVE should I use for the Polyfill[.]io supply chain attack? I see that CVE-2024-38526 exists, but it's specifically for pdoc. Is there a better one?

:boost_love:

#PolyfillIO #CVE #infosec

๐Ÿงฟ๐Ÿชฌ๐Ÿ„๐ŸŒˆ๐ŸŽฎ๐Ÿ’ป๐Ÿšฒ๐Ÿฅ“๐ŸŽƒ๐Ÿ’€๐Ÿด๐Ÿ›ป๐Ÿ‡บ๐Ÿ‡ธschizanon
2024-09-09

Y'all remember ?

I realize the lesson there is; don't depend on code from domains you don't control, and in an ideal world that's what you should do

But is there still a need there? Are there features you'd like to use but you don't want to introduce a build process just to bundle the from ?

Or is there no point in since don't share caches between origins these days so there's no precaching benefit anymore?

๐Ÿงฟ๐Ÿชฌ๐Ÿ„๐ŸŒˆ๐ŸŽฎ๐Ÿ’ป๐Ÿšฒ๐Ÿฅ“๐ŸŽƒ๐Ÿ’€๐Ÿด๐Ÿ›ป๐Ÿ‡บ๐Ÿ‡ธschizanon
2024-07-11

So, I'm thinking; what if I build polyfill.io, but on the Blockchain! Hey come back..

Hear me out; are immutable, and transparent. So long as the nodes can be trusted to execute the code properly (I presume there are cryptographic guarantees of output validity) then it could be safer from supply chain attacks.

iam-py-test :unverified:iampytest1@infosec.exchange
2024-07-09

On July 5th, PolyfillIO switched to polyfill[.]top
This domain is currently unblocked by uBlock Origin and all major blocklists.
Tweet: x[.]com/Polyfill_Global/status
Thread with more information and also making fun of Windows users.

#PolyfillIO #PolyfillIOAttack

A Tweet from @Polyfill_Global, posted at 3:11 on July 5th 2024. The Tweet reads "use new domain polyfill.top"
WetHat๐Ÿ’ฆWetHat@fosstodon.org
2024-07-04

384,000 sites pull code from sketchy code library recently bought by Chinese firm | @dangoodin

A supply-chain attack on Polyfill.io, a #JavaScript library, redirected users to malicious sites. So far, bootcss.com is the only domain showing any signs of potential malice. The nature of the other associated endpoints remains unknown

#CyberSecurity #SupplyChainAttack #WebDevelopment #WebProgramming #WebSecurity #Polyfill #PolyfillIO

arstechnica.com/security/2024/

๐Ÿงฟ๐Ÿชฌ๐Ÿ„๐ŸŒˆ๐ŸŽฎ๐Ÿ’ป๐Ÿšฒ๐Ÿฅ“๐ŸŽƒ๐Ÿ’€๐Ÿด๐Ÿ›ป๐Ÿ‡บ๐Ÿ‡ธschizanon
2024-07-03

> -based company acquired the domain and the GitHub account that hosted the code. On June 25, researchers from firm Sansec reported that code hosted on the polyfill domain had been changed to redirect users to adult- and gambling-themed websites. The code was deliberately designed to mask the redirections by performing them only at certain times of the day and only against visitors who met specific criteria.

arstechnica.com/security/2024/

2024-07-01

If you're using #polyfillio code on your site โ€“ like 100,000+ are โ€“ remove it immediately

theregister.com/2024/06/25/pol

Marcel SIneM(S)USsimsus@social.tchncs.de
2024-07-01
๐Ÿงฟ๐Ÿชฌ๐Ÿ„๐ŸŒˆ๐ŸŽฎ๐Ÿ’ป๐Ÿšฒ๐Ÿฅ“๐ŸŽƒ๐Ÿ’€๐Ÿด๐Ÿ›ป๐Ÿ‡บ๐Ÿ‡ธschizanon
2024-06-28

> The recent large scale supply chain attack conducted via multiple CDNs, namely Polyfill.io, BootCDN, Bootcss, and Staticfile that affected anywhere from 100,000 to tens of millions of websites has been traced to a common operator

> Researchers discovered a public GitHub repository where the purported operators of Polyfill.io had accidentally exposed their Cloudflare secret keys.

LOL, FAIL!

bleepingcomputer.com/news/secu

Benjamin Carr, Ph.D. ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป๐ŸงฌBenjaminHCCarr@hachyderm.io
2024-06-28

Large #supplychain attack conducted via multiple #CDN, namely #PolyfillIo #BootCDN, #Bootcss, & #Staticfile that affected anywhere from 100,000 to tens of millions of websites has been traced to common operator.
A GitHub repository where the purported operators of Polyfill.io had accidentally exposed their #Cloudflare keys.
Using leaked #API keys researchers were able to establish that common operator was behind all four domains, and wider #supplychainattack
bleepingcomputer.com/news/secu

Secrets stored in .env file exposed in a GitHub repository
Scripter :verified_flashing:scripter@social.tchncs.de
2024-06-28

JavaScript-Service Polyfill.io: 100.000 Sites binden Schadcode รผber CDN ein | heise online
heise.de/-9778256 #ContentDeliveryNetwork #CDN #Polyfillio

iam-py-test :unverified:iampytest1@infosec.exchange
2024-06-27
2024-06-27

#OpenSource libs routinely use polyfill.io. Just bc you arent using the compromised #CDN directly, one of your deps might be. We put together a list of recently released pkgs that ref polyfill.io!

#polyfill #polyfillio #malware

blog.phylum.io/a-note-about-po

๐Ÿงฟ๐Ÿชฌ๐Ÿ„๐ŸŒˆ๐ŸŽฎ๐Ÿ’ป๐Ÿšฒ๐Ÿฅ“๐ŸŽƒ๐Ÿ’€๐Ÿด๐Ÿ›ป๐Ÿ‡บ๐Ÿ‡ธschizanon
2024-06-26

UBlock Origin is now blocking polyfill.io

Your regular reminder that AdBlockers are not just for hiding banner ads, they are also an indispensable tool for and

github.com/uBlockOrigin/uAsset

/cc @AmeliaBR

iam-py-test :unverified:iampytest1@infosec.exchange
2024-06-26

GitHub has placed a warning on the PolyfillIO repository (github.com/polyfillpolyfill/po), and has denied access for non-logged in users. The other two repositories owned by that account are unblocked. Dismissing the warning appears to be permanent for an account.

#PolyfillIo #polyfillIoAttack #GitHubSecurity

A warning reading "This repository contains malicious content that may cause technical harms. We have decided to preserve this content for security research purposes. Please exercise CAUTION when clicking links, downloading releases, or otherwise interacting with this repository."
There are two buttons; "Discover other projects on GitHub" and "View repository".
Offscreen, there are options to block the user polyfillpolyfill and view GitHub's guidelines.
Amelia Bellamy-RoydsAmeliaBR@front-end.social
2024-06-26

Re the #polyfillio malware issue:

I've seen a lot of people telling web developers to update any sites that use the service. But we all know there are countless unmaintained websites out there for small business and orgs.

The other thing that should be done is clientside, to block access to the URL so your browser won't download the malware even if a website asks it to.

Anyone got a good guide for doing that, at the individual browser or OS level? (For those without institutional firewalls.)

iam-py-test :unverified:iampytest1@infosec.exchange
2024-06-26

PolyfillIO maintainer denies they are serving malicious JavaScript

Someone has maliciously defamed us. We have no supply chain risks because all content is statically cached. Any involvement of third parties could introduce potential risks to your website, but no one would do this as it would be jeopardize our own reputation.

github.com/polyfillpolyfill/po

#polyfillIo #polyfillIoAttack

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst