Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Sep 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linuxfoundation
Linuxfoundation dragonfly |
|
CPEs | cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:* | |
Vendors & Products |
Linuxfoundation
Linuxfoundation dragonfly |
|
Metrics |
cvssV3_1
|
Thu, 18 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 18 Sep 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dragonflyoss
Dragonflyoss dragonfly2 |
|
Vendors & Products |
Dragonflyoss
Dragonflyoss dragonfly2 |
Wed, 17 Sep 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0. | |
Title | Dragonfly tiny file download uses hard coded HTTP protocol | |
Weaknesses | CWE-311 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-17T19:58:54.083Z
Updated: 2025-09-18T15:47:03.096Z
Reserved: 2025-09-15T19:13:16.903Z
Link: CVE-2025-59410

Updated: 2025-09-18T15:46:56.837Z

Status : Analyzed
Published: 2025-09-17T20:15:38.293
Modified: 2025-09-18T16:54:11.567
Link: CVE-2025-59410

No data.