Home

Description

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one character at a time by sending all possible characters to a vulnerable mechanism and measuring the comparison instruction’s execution times. This vulnerability is fixed in 2.1.0.

PUBLISHED Reserved 2025-09-12 | Published 2025-09-17 | Updated 2025-09-18 | Assigner GitHub_M




LOW: 2.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

Problem types

CWE-208: Observable Timing Discrepancy

Product status

< 2.1.0
affected

References

github.com/...gonfly/security/advisories/GHSA-c2fc-9q9c-5486

github.com/...curity/dragonfly-comprehensive-report-2023.pdf

cve.org (CVE-2025-59350)

nvd.nist.gov (CVE-2025-59350)

Download JSON