images
figures
Blog

RCE in Cdnjs and What It Means to You

Francesco Altomare
19.07.2021
image 3 Min read
Supply-Chain Data Protection

Last week, a researcher named RyotaK shared a clever supply chain vulnerability in Cloudflare’s highly popular hosted module called cdnjs, which runs on around 12% of all sites on the web. The module helps developers consume other popular packages and integrate them safely into their sites. 

The vulnerability was in the cdnjs library update server and could have led to remote code execution on both Cloudflare’s servers and run malicious code on the scripts themselves which are consumed by all end users, bypassing WAFs and any other filtering mechanisms as it runs directly on the browser itself. 

You can read a detailed description of the vulnerability here

 

How 3rd party scripts facilitate supply-chain attacks 

3rd parties are becoming extremely common and most sites use them today. In this case, the attacker could use a supply-chain attack to modify 3rd party scripts. In other cases, like magecart (add link to something about magecart) – an attacker modified the script directly and injected code into the end users browsers.

 

3rd party scripts (chat features, accessibility features, tracking and many more) usually make their way to your web asset via a “tag manager”. Tag managers integrate complex javascripts into your website code quickly, without integration efforts- but also with essentially no security controls. You might not be aware of the vulnerabilities it creates, but those scripts are popular targets for malicious actors as once they compromise one, they eventually comprise a large number of sites.

Take the Magecart 3rd party javascript attack on British Airways back in 2018. The attackers hacked BA’s payment form through a compromised 3rd party javascript vendor. The script tag they injected was simple – just 22 lines of code. It acted as a digital card skimmer and directed some 420,000 users to a fraudulent website, where their PII was harvested over 15 days. 

Differently, yet similarly, hundreds of thousands of Israeli websites were defaced in a 2019 fourth-party attack. Attackers hacked the accessibility add-on “Nagish” via its compromised hosting company and changed its DNS record. The code injected into the Nagish javascript was able to deface those websites. 


Essentially, the cause and effect in both cases are the same: blindly running untrusted code on your end-users browsers. 

 

How to minimize your attack surface

DIY solutions

These require some legwork, but are available freely:

  1. Use Subresource Integrity hashes for all external content, and demand those from your 3rd party script vendor. You can also generate your own by using openssl or SRI Hash Generator 
  2. Collect CSP reports, whitelist 3rd parties and enforce strict Hash/Nonce-based CSP – https://web.dev/strict-csp/

 

Managed Solutions

In GlobalDots, we’re in a unique position to offer holistic web security solutions that prevent and intercept supply chain attacks, as well as other forms of web-borne attacks. Our solutions offer autonomous monitoring, detection and prevention of client side attacks.

While solutions differ in their modus operandi, the end result is the same: They allow you to monitor your end users’ requests and permissions, how your 3rd party scripts are run, and what they are allowed and not allowed to do, in <1 day deployment. 

Your ideal solution depends on your business and risk profile. It’s our job to analyze them, implement the best choice, and configure it for utmost protection and flexibility at work.

Contact us for effortless, worriless security of your web assets.

Comments

0 comments

There’s more to see

slider item
Your Innovation Feed
Hear It From 3 Security Leaders: How Security Can Accelerate Business
Dror Arie 18.10.21

Which is more important: security or speed? This question has long been a source of concern for businesses worldwide, and it can leave many organizations vulnerable to hacks in the name of doing things fast and improving employee work experience.  Starting today, to foster corporate security and growth, you do not need to compromise your […]

Read more
slider item
Managed DNS
Downtime is Pricy, Solution isn’t: How to Stay Out of DNS Outages
Francesco Altomare 13.10.21

The recent global DNS outages, with the latest addition of Facebook-Instagram-WhatsApp, are a call to transform your approach to DNS solutions. In this webinar, we explore whether cloud-borne environments are really fail-proof and how businesses can use the most advanced cybersecurity methods and DNS solutions to minimize their risk of server failures, code misconfigurations, DDoS […]

Read more
slider item
Bot Mitigation & Anti-Fraud
Defending eCommerce from Bots… Without Dissing Your Customers
Dr. Eduardo Rocha 22.09.21

The real big winners of eCommerce surge 2020 saw the largest year-over-year growth in eCommerce sales. Throughout this growth, fraudsters continued to develop sophisticated attacks to fill their pockets. One of the most devastating attack types is automated fraud: bots that mimic the actions of a real customer so they can bypass fraud prevention tools. […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure

Don’t Fortify. Amplify | Cloud Security Reimagined