Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-59345— Dragonfly did not enable authentication for some Manager’s endpoints

EPSS 0.06% · P18
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-59345

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Dragonfly did not enable authentication for some Manager’s endpoints
Source: NVD (National Vulnerability Database)
Vulnerability Description
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, The /api/v1/jobs and /preheats endpoints in Manager web UI are accessible without authentication. Any user with network access to the Manager can create, delete, and modify jobs, and create preheat jobs. An unauthenticated adversary with network access to a Manager web UI uses /api/v1/jobs endpoint to create hundreds of useless jobs. The Manager is in a denial-of-service state, and stops accepting requests from valid administrators. This vulnerability is fixed in 2.1.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
Dragonfly 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Dragonfly是DragonflyDB开源的一个框架,可以对任何内容类型进行动态处理。 Dragonfly 2.1.0之前版本存在访问控制错误漏洞,该漏洞源于/api/v1/jobs和/preheats端点未经验证即可访问,可能导致拒绝服务攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
dragonflyossdragonfly < 2.1.0 -

II. Public POCs for CVE-2025-59345

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-59345

登录查看更多情报信息。

Same Patch Batch · dragonflyoss · 2025-09-17 · 11 CVEs total

CVE-2025-59350Timing attacks against Proxy’s basic authentication are possible
CVE-2025-59352Dragonfly allows arbitrary file read and write on a peer machine
CVE-2025-59348Dragonfly incorrectly handles a task structure’s usedTraffic field
CVE-2025-59347Dragonfly Manager makes requests to external endpoints with disabled TLS authentication
CVE-2025-59351Dragonfly possibly panics due to nil pointer dereference when using variables created alon
CVE-2025-59346Dragonfly server-side request forgery vulnerability
CVE-2025-59349Directories created via os.MkdirAll are not checked for permissions
CVE-2025-59410Dragonfly tiny file download uses hard coded HTTP protocol
CVE-2025-59354Dragonfly has weak integrity checks for downloaded files
CVE-2025-59353Manager generates mTLS certificates for arbitrary IP addresses

IV. Related Vulnerabilities

V. Comments for CVE-2025-59345

No comments yet


Leave a comment