CVE-2025-59350

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one character at a time by sending all possible characters to a vulnerable mechanism and measuring the comparison instruction’s execution times. This vulnerability is fixed in 2.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*

History

18 Sep 2025, 20:15

Type Values Removed Values Added
CPE cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*
First Time Linuxfoundation
Linuxfoundation dragonfly
References () https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf - () https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf - Product
References () https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-c2fc-9q9c-5486 - () https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-c2fc-9q9c-5486 - Patch, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

17 Sep 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-17 20:15

Updated : 2025-09-18 20:15


NVD link : CVE-2025-59350

Mitre link : CVE-2025-59350

CVE.ORG link : CVE-2025-59350


JSON object : View

Products Affected

linuxfoundation

  • dragonfly
CWE
CWE-208

Observable Timing Discrepancy