CVE-2025-59347

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, The Manager disables TLS certificate verification in HTTP clients. The clients are not configurable, so users have no way to re-enable the verification. A Manager processes dozens of preheat jobs. An adversary performs a network-level Man-in-the-Middle attack, providing invalid data to the Manager. The Manager preheats with the wrong data, which later causes a denial of service and file integrity problems. This vulnerability is fixed in 2.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*

History

18 Sep 2025, 20:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Linuxfoundation
Linuxfoundation dragonfly
CPE cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*
References () https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf - () https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf - Product
References () https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-98x5-jw98-6c97 - () https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-98x5-jw98-6c97 - Patch, Third Party Advisory

17 Sep 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-17 20:15

Updated : 2025-09-18 20:19


NVD link : CVE-2025-59347

Mitre link : CVE-2025-59347

CVE.ORG link : CVE-2025-59347


JSON object : View

Products Affected

linuxfoundation

  • dragonfly
CWE
CWE-295

Improper Certificate Validation