Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-59346— Dragonfly server-side request forgery vulnerability

EPSS 0.06% · P18
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-59346

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Dragonfly server-side request forgery vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Dragonfly is an open source P2P-based file distribution and image acceleration system. Versions prior to 2.1.0 contain a server-side request forgery (SSRF) vulnerability that enables users to force DragonFly2’s components to make requests to internal services that are otherwise not accessible to them. The issue arises because the Manager API accepts a user-supplied URL when creating a Preheat job with weak validation, peers can trigger other peers to fetch an arbitrary URL through pieceManager.DownloadSource, and internal HTTP clients follow redirects, allowing a request to a malicious server to be redirected to internal services. This can be used to probe or access internal HTTP endpoints. The vulnerability is fixed in version 2.1.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Dragonfly 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Dragonfly是DragonflyDB开源的一个框架,可以对任何内容类型进行动态处理。 Dragonfly 2.1.0之前版本存在代码问题漏洞,该漏洞源于Manager API在创建Preheat作业时接受用户提供的URL且验证不足,可能导致服务端请求伪造攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
dragonflyossdragonfly < 2.1.0 -

II. Public POCs for CVE-2025-59346

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-59346

登录查看更多情报信息。

Same Patch Batch · dragonflyoss · 2025-09-17 · 11 CVEs total

CVE-2025-59350Timing attacks against Proxy’s basic authentication are possible
CVE-2025-59352Dragonfly allows arbitrary file read and write on a peer machine
CVE-2025-59345Dragonfly did not enable authentication for some Manager’s endpoints
CVE-2025-59348Dragonfly incorrectly handles a task structure’s usedTraffic field
CVE-2025-59347Dragonfly Manager makes requests to external endpoints with disabled TLS authentication
CVE-2025-59351Dragonfly possibly panics due to nil pointer dereference when using variables created alon
CVE-2025-59349Directories created via os.MkdirAll are not checked for permissions
CVE-2025-59410Dragonfly tiny file download uses hard coded HTTP protocol
CVE-2025-59354Dragonfly has weak integrity checks for downloaded files
CVE-2025-59353Manager generates mTLS certificates for arbitrary IP addresses

IV. Related Vulnerabilities

V. Comments for CVE-2025-59346

No comments yet


Leave a comment