Archived link

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. Any complaints were quickly removed (archive here) from the Github repository.

  • originalucifer@moist.catsweat.com
    link
    fedilink
    arrow-up
    164
    arrow-down
    25
    ·
    1 year ago

    nah. over 100k sites ignored dependency risks, even after the original owners warned them this exact thing would happen.

    the real story is 100k sites not being run appropriately.

    • douglasg14b@lemmy.world
      link
      fedilink
      English
      arrow-up
      73
      arrow-down
      4
      ·
      edit-2
      1 year ago

      That’s not how systemic problems work.

      This is probably one of the most security ignorant takes on here.

      People will ALWAYS fuck up. The world we craft for ourselves must take the “human factor” into account, otherwise we amplify the consequences of what are predictable outcomes. And ignoring predictable outcomes to take some high ground doesn’t cary far.

      The majority of industries that actually have immediate and potentially fatal consequences do exactly this, and have been for more than a generation now.

      Damn near everything you interact with on a regular basis has been designed at some point in time with human psychology in mind. Built on the shoulders of decades of research and study results, that have matured to the point of becoming “standard practices”.

      • oce 🐆@jlai.lu
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        1 year ago

        Ok, people will always fuck up, so what do you do?

        The majority of industries that actually have immediate and potentially fatal consequences do exactly this, and have been for more than a generation now.

        All the organizations (including public) getting ransomware and data stolen, it’s because the consequences are not that bad? It is not gross negligence?

    • ShaunaTheDead@fedia.io
      link
      fedilink
      arrow-up
      42
      ·
      1 year ago

      One place I worked at recently was still using Node version 8. Running npm install would give me a mini heart attack… Like 400+ critical vulnerabilities, it was several thousand vulnerabilities all around.

      • corsicanguppy@lemmy.ca
        link
        fedilink
        English
        arrow-up
        20
        arrow-down
        1
        ·
        1 year ago

        Running npm install would give me a mini heart attack

        It should; but more because it installs things right off the net with no validation. Consistency of code product is not the only thing you’re tossing.

        • LordCrom@lemmy.world
          link
          fedilink
          English
          arrow-up
          9
          ·
          1 year ago

          How else would you get LPAD ? Expect me to write 2 lines of code when I could just import a 100 Mb library to do it for me?

        • AA5B@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 year ago

          You need to get up to date from three years ago. NodeJS 16.20, or thereabouts, enabled dependency auditing by default.

          I’m still fighting my engineers go get current enough to use this (but we do have a proxy artifact server that also attempts to keep downloads clean, and a dependency scanner)

      • unalivejoy@lemm.ee
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 year ago

        If you’re on RHEL 8+, you can install the latest version of node with dnf.

        dnf install nodejs will likely install node 8 :(. Use dnf module install nodejs:20 to install the latest version.

    • Optional@lemmy.world
      link
      fedilink
      English
      arrow-up
      32
      arrow-down
      3
      ·
      1 year ago

      the real story is 100k sites not being run appropriately.

      Same as it ever was. Same as it ever was. Same as it ever was.

      • kautau@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        2
        ·
        1 year ago

        Yeah this is just capitalistic business in general. Don’t do anything proactive if it might reduce the bottom line in the short term. Blame others and beg for help when you weren’t proactive. Succeed singularly, fail collectively

      • Warl0k3@lemmy.world
        link
        fedilink
        English
        arrow-up
        56
        arrow-down
        1
        ·
        edit-2
        1 year ago

        I don’t think we have to choose. “Maintain your websites so you don’t get taken advantage of” and “Here’s an example of a major-world-power-affiliated group exploting that thing you didn’t do” are both pretty important stories.

      • themurphy@lemmy.ml
        link
        fedilink
        English
        arrow-up
        27
        arrow-down
        1
        ·
        1 year ago

        The malware thing still deserves a headline. They just argue it’s stupid so many even have to use the library to begin with.