Archived link

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. Any complaints were quickly removed (archive here) from the Github repository.

  • @9point6
    link
    English
    19
    edit-2
    6 months ago

    A whitelist wouldn’t mitigate this issue entirely due to bundling

    • @[email protected]
      link
      fedilink
      English
      2
      edit-2
      6 months ago

      In this case the script wasn’t bundled at all - it was hotlinked from a third party CDN. Adding malicious code instantly affects all the sites that load it.

      The output differs depending on browser (it only loads the polyfills your browser needs) so it’s incompatible with subresource integrity.