Lucene search

K
githubGitHub Advisory DatabaseGHSA-5VGJ-GGM4-FG62
HistoryJun 25, 2024 - 10:23 p.m.

pdoc embeds link to malicious CDN if math mode is enabled

2024-06-2522:23:30
GitHub Advisory Database
github.com
13
pdoc
math mode
polyfill.io
cdn
javascript
polyfill supply chain attack
update
patch
security advisory
software

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Impact

Documentation generated with pdoc --math linked to JavaScript files from polyfill.io.
The polyfill.io CDN has been sold and now serves malicious code.

Users who produce documentation with math mode should update immediately. All other users are unaffected.

Patches

This issue has been fixed in pdoc 14.5.1.

References

https://github.com/mitmproxy/pdoc/pull/703
https://sansec.io/research/polyfill-supply-chain-attack

Timeline

  • [2024-06-25] https://sansec.io/research/polyfill-supply-chain-attack is published.
  • [2024-06-25 20:54 UTC] Issue reported to the pdoc project by @adhintz.
  • [2024-06-25 21:33 UTC] Patched version released.
  • [2024-06-25 21:37 UTC] Security advisory published.
  • [2024-06-25 23:49 UTC] CVE-2024-38526 assigned by GitHub.

Affected configurations

Vulners
Node
pdocRange<14.5.1
CPENameOperatorVersion
pdoclt14.5.1

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Related for GHSA-5VGJ-GGM4-FG62