CVE-2025-59410

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*

History

No history.

Information

Published : 2025-09-17 20:15

Updated : 2025-09-18 16:54


NVD link : CVE-2025-59410

Mitre link : CVE-2025-59410

CVE.ORG link : CVE-2025-59410


JSON object : View

Products Affected

linuxfoundation

  • dragonfly
CWE
CWE-311

Missing Encryption of Sensitive Data