VYPR

Go modules package

github.com/dragonflyoss/dragonfly

pkg:golang/github.com/dragonflyoss/dragonfly

Vulnerabilities (11)

  • CVE-2025-59410Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle at

  • CVE-2025-59354Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the DragonFly2 uses a variety of hash functions, including the MD5 hash, for downloaded files. This allows attackers to replace files with malicious ones that have a colliding h

  • CVE-2025-59353Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, a peer can obtain a valid TLS certificate for arbitrary IP addresses, effectively rendering the mTLS authentication useless. The issue is that the Manager’s Certificate gRPC ser

  • CVE-2025-59352Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the gRPC API and HTTP APIs allow peers to send requests that force the recipient peer to create files in arbitrary file system locations, and to read arbitrary files. This allow

  • CVE-2025-59351Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the first return value of a function is dereferenced even when the function returns an error. This can result in a nil dereference, and cause code to panic. This vulnerability i

  • CVE-2025-59350Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one ch

  • CVE-2025-59349Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, DragonFly2 uses the os.MkdirAll function to create certain directory paths with specific access permissions. This function does not perform any permission checks when a given di

  • CVE-2025-59348Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the processPieceFromSource method does not update the structure’s usedTraffic field, because an uninitialized variable n is used as a guard to the AddTraffic method call, instea

  • CVE-2025-59347Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, The Manager disables TLS certificate verification in HTTP clients. The clients are not configurable, so users have no way to re-enable the verification. A Manager processes doze

  • CVE-2025-59346Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Versions prior to 2.1.0 contain a server-side request forgery (SSRF) vulnerability that enables users to force DragonFly2’s components to make requests to internal services that are otherwise n

  • CVE-2025-59345Sep 17, 2025
    affected < 2.1.0fixed 2.1.0

    Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, The /api/v1/jobs and /preheats endpoints in Manager web UI are accessible without authentication. Any user with network access to the Manager can create, delete, and modify jobs