Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-29765 DragonFly's tiny file download uses hard coded HTTP protocol
Github GHSA Github GHSA GHSA-mcvp-rpgg-9273 DragonFly's tiny file download uses hard coded HTTP protocol
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 18 Sep 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation dragonfly
CPEs cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*
Vendors & Products Linuxfoundation
Linuxfoundation dragonfly
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Thu, 18 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Sep 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Dragonflyoss
Dragonflyoss dragonfly2
Vendors & Products Dragonflyoss
Dragonflyoss dragonfly2

Wed, 17 Sep 2025 20:00:00 +0000

Type Values Removed Values Added
Description Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.
Title Dragonfly tiny file download uses hard coded HTTP protocol
Weaknesses CWE-311
References
Metrics cvssV4_0

{'score': 5.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-18T15:47:03.096Z

Reserved: 2025-09-15T19:13:16.903Z

Link: CVE-2025-59410

cve-icon Vulnrichment

Updated: 2025-09-18T15:46:56.837Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-17T20:15:38.293

Modified: 2025-09-18T16:54:11.567

Link: CVE-2025-59410

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-18T11:58:50Z