Skip to content

Commit

Permalink
JavaScript Polyfill Supply Chain Attack (wagov#824)
Browse files Browse the repository at this point in the history
* Updated this advisory with product affected version

* Format markdown docs

* JavaScript Polyfill Supply Chain Attack

* Format markdown docs

---------

Co-authored-by: CharlesRN <CharlesRN@users.noreply.github.com>
Co-authored-by: Joshua Hitchen (DGov) <86041569+DGovEnterprise@users.noreply.github.com>
  • Loading branch information
3 people authored Jun 26, 2024
1 parent ca5bc03 commit dec907f
Show file tree
Hide file tree
Showing 2 changed files with 26 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,9 @@ This vulnerability allows remote attackers to bypass the Mark-of-the-Web protect

## What is vulnerable?

| Products Affected. | CVE | CVSS | Severity |
| ---------------------------------- | --------------------------------------------------------------- | ---- | -------- |
| **Dropbox Desktop Folder Sharing** | [CVE-2024-5924](https://nvd.nist.gov/vuln/detail/CVE-2024-5924) | 8.8 | **High** |
| Products Affected. | CVE | CVSS | Severity |
| ------------------------------------------------------------ | --------------------------------------------------------------- | ---- | -------- |
| **Dropbox Desktop Folder Sharing** Versions prior 198.4.7615 | [CVE-2024-5924](https://nvd.nist.gov/vuln/detail/CVE-2024-5924) | 8.8 | **High** |

## What has been observed?

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
# JavaScript Polyfill Supply Chain Attack - 20240626004

## Overview

The JavaScript library Polyfill.io, which is extensively utilized, has been flagged for substantial security vulnerabilities after being acquired by the Chinese firm Funnull. Sansec, a cybersecurity firm, has issued a warning that since the acquisition earlier this year, the polyfill.io service and domain have been compromised to inject harmful code into websites, indicating a supply chain attack which impacts over 100K sites.

## Summary

The polyfill code is dynamically generated based on the HTTP headers, so multiple attack vectors are likely.

In addition, the decrypted malware code redirects users to a sports betting website using a dummy Google analytics domain (www.googie-anaiytics.com). The code is designed to prevent against reverse engineering and only activates on specific mobile devices at specific hours. It also does not turn on when it detects an admin user, and delays execution when a web analytics service is found, presumably so that it does not appear in the statistics.

Currently, the cdn.polyfill.io domain is inexplicably diverted to Cloudflare's mirror. However, because the domain's DNS servers are unaltered, the owners can easily switch it back to their own domains at any time.

Google has also started blocking Google Ads for websites using the affected code to reduce the number of potential targets.

## Recommended Mitigations

The WA SOC recommends that any website currently using Polyfill.io to immediately remove its code to avoid potential security breaches. The web administrator are encouraged to support secure and sustainable alternatives to ensure the integrity of their projects.

## Reference

- Bleeping Computer: <https://www.bleepingcomputer.com/news/security/polyfillio-javascript-supply-chain-attack-impacts-over-100k-sites/>

0 comments on commit dec907f

Please sign in to comment.