Skip to content

๐Ÿ”’๏ธ Fix polyfill supply chain attack vulnerability #885

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weโ€™ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jan 18, 2025

Conversation

ebouchut
Copy link
Collaborator

This PR removes the polyfill JS import from LoopDocs due to the below security issue.

Over 100,000 sites have been impacted in a supply chain attack by the Polyfill.io service after a Chinese company acquired the domain and the script was modified to redirect users to malicious and scam sites.

Today, cybersecurity company Sansec warned that the polyfill.io domain and service was purchased earlier this year by a Chinese company named 'Funnull' and the script has been modified to introduce malicious code on websites in a supply chain attack.

"However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io," explains Sansec.

When the polyfill.io was purchased, the project developer warned that he never owned the polyfill.io site and that all websites should remove it immediately. To reduce the risk of a potential supply chain attack, Cloudflare and Fastly set up their own mirrors of the Polyfill.io service so that websites could use a trusted service.

"No website today requires any of the polyfills in the http://polyfill.io library," tweeted the original Polyfills service project developer.
[...]
Read more

Source: BleepingComputer:

Additional Context

Note

The Polyfill JS library provides code that replicates missing or unsupported modern JavaScript features in older browsers, ensuring compatibility for applications using APIs like Promise, fetch, or Object.assign. It is commonly used in web projects targeting a wide range of browser versions to maintain functionality without requiring developers to manually write compatibility code. Typical use cases include supporting legacy browsers like Internet Explorer 11 or outdated Android WebViews and enabling modern features such as Intl (internationalization), IntersectionObserver, or ES6+ methods in older environments.

@ebouchut ebouchut changed the title ๐Ÿ› Fix polyfill supply chain attack vulnerability ๐Ÿ”’๏ธ Fix polyfill supply chain attack vulnerability Jan 18, 2025
@ebouchut ebouchut self-assigned this Jan 18, 2025
Copy link
Collaborator Author

@ebouchut ebouchut left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

๐Ÿ‘ LGTM

@ebouchut ebouchut merged commit ce6bfac into LoopKit:main Jan 18, 2025
@ebouchut ebouchut deleted the fix/polyfill_supply_chain_attack branch January 18, 2025 12:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant