Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one character at a time by sending all possible characters to a vulnerable mechanism and measuring the comparison instruction’s execution times. This vulnerability is fixed in 2.1.0.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Sep 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linuxfoundation
Linuxfoundation dragonfly |
|
CPEs | cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:* | |
Vendors & Products |
Linuxfoundation
Linuxfoundation dragonfly |
|
Metrics |
cvssV3_1
|
Thu, 18 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 18 Sep 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dragonflyoss
Dragonflyoss dragonfly2 |
|
Vendors & Products |
Dragonflyoss
Dragonflyoss dragonfly2 |
Wed, 17 Sep 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one character at a time by sending all possible characters to a vulnerable mechanism and measuring the comparison instruction’s execution times. This vulnerability is fixed in 2.1.0. | |
Title | Timing attacks against Proxy’s basic authentication are possible | |
Weaknesses | CWE-208 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-17T19:43:24.085Z
Updated: 2025-09-18T17:42:07.237Z
Reserved: 2025-09-12T12:36:24.637Z
Link: CVE-2025-59350

Updated: 2025-09-18T17:42:03.382Z

Status : Analyzed
Published: 2025-09-17T20:15:37.373
Modified: 2025-09-18T20:15:45.780
Link: CVE-2025-59350

No data.