VYPR
Moderate severityNVD Advisory· Published Sep 17, 2025· Updated Sep 18, 2025

Timing attacks against Proxy’s basic authentication are possible

CVE-2025-59350

Description

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one character at a time by sending all possible characters to a vulnerable mechanism and measuring the comparison instruction’s execution times. This vulnerability is fixed in 2.1.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Dragonfly Proxy access control in Dragonfly before 2.1.0 uses simple string comparisons, enabling timing attacks to guess passwords character by character.

Vulnerability

Overview

CVE-2025-59350 affects Dragonfly, an open-source P2P-based file distribution and image acceleration system. The vulnerability resides in the access control mechanism for the Proxy feature, which uses simple string comparisons are used to validate passwords. This design is susceptible to timing attacks, where an attacker can infer the correct password one character at a time by measuring the execution time of comparison operations [1][2].

Exploitation

An attacker with network access to the Proxy endpoint can send crafted authentication requests. By systematically varying each character of the password and observing response timing differences, the attacker can deduce the correct password incrementally. No prior authentication is required, and the attack prerequisites include only network connectivity to the vulnerable service [1][4].

Impact

Successful exploitation allows the attacker to bypass the Proxy's authentication, gaining unauthorized access to the Proxy feature. This could lead to further compromise of the Dragonfly system, including potential data exfiltration or disruption of file distribution services [1][3].

Mitigation

The vulnerability is fixed in Dragonfly version 2.1.0. Users are strongly advised to upgrade to this version or later. No workarounds are documented, and the issue is tracked in the Go vulnerability database as GO-2025-3972 [1][4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/dragonflyoss/dragonflyGo
< 2.1.02.1.0
d7y.io/dragonfly/v2Go
< 2.1.02.1.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.