Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one character at a time by sending all possible characters to a vulnerable mechanism and measuring the comparison instruction’s execution times. This vulnerability is fixed in 2.1.0.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 17 Sep 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one character at a time by sending all possible characters to a vulnerable mechanism and measuring the comparison instruction’s execution times. This vulnerability is fixed in 2.1.0. | |
Title | Timing attacks against Proxy’s basic authentication are possible | |
Weaknesses | CWE-208 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-17T19:43:24.085Z
Reserved: 2025-09-12T12:36:24.637Z
Link: CVE-2025-59350

No data.

Status : Received
Published: 2025-09-17T20:15:37.373
Modified: 2025-09-17T20:15:37.373
Link: CVE-2025-59350

No data.

No data.