fides.js 中包含不受信任的 polyfill.io 代码漏洞 (CVE-2024-38537)

admin 2024-07-09 08:45:01 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
fides.js 中包含不受信任的 polyfill.io 代码漏洞 (CVE-2024-38537)

CVE编号

CVE-2024-38537

利用情况

暂无

补丁情况

N/A

披露时间

2024-07-03
漏洞描述
Fides is an open-source privacy engineering platform. `fides.js`, a client-side script used to interact with the consent management features of Fides, used the `polyfill.io` domain in a very limited edge case, when it detected a legacy browser such as IE11 that did not support the fetch standard. Therefore it was possible for users of legacy, pre-2017 browsers who navigate to a page serving `fides.js` to download and execute malicious scripts from the `polyfill.io` domain when the domain was compromised and serving malware. No exploitation of `fides.js` via `polyfill.io` has been identified as of time of publication. The vulnerability has been patched in Fides version `2.39.1`. Users are advised to upgrade to this version or later to secure their systems against this threat. On Thursday, June 27, 2024, Cloudflare and Namecheap intervened at a domain level to ensure `polyfill.io` and its subdomains could not resolve to the compromised service, rendering this vulnerability unexploitable. Prior to the domain level intervention, there were no server-side workarounds and the confidentiality, integrity, and availability impacts of this vulnerability were high. Clients could ensure they were not affected by using a modern browser that supported the fetch standard.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://fetch.spec.whatwg.org
https://github.com/ethyca/fides/commit/868c4d629760572192bd61db34f5a4458ed12005
https://github.com/ethyca/fides/pull/5026
https://github.com/ethyca/fides/security/advisories/GHSA-cvw4-c69g-7v7m
https://sansec.io/research/polyfill-supply-chain-attack
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0