Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 17 Sep 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0. | |
Title | Dragonfly tiny file download uses hard coded HTTP protocol | |
Weaknesses | CWE-311 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-17T19:58:54.083Z
Reserved: 2025-09-15T19:13:16.903Z
Link: CVE-2025-59410

No data.

Status : Received
Published: 2025-09-17T20:15:38.293
Modified: 2025-09-17T20:15:38.293
Link: CVE-2025-59410

No data.

No data.