Home

Description

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.

PUBLISHED Reserved 2025-09-15 | Published 2025-09-17 | Updated 2025-09-18 | Assigner GitHub_M




MEDIUM: 5.5CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P

Problem types

CWE-311: Missing Encryption of Sensitive Data

Product status

< 2.1.0
affected

References

github.com/...gonfly/security/advisories/GHSA-mcvp-rpgg-9273

github.com/...curity/dragonfly-comprehensive-report-2023.pdf

cve.org (CVE-2025-59410)

nvd.nist.gov (CVE-2025-59410)

Download JSON