Skip to main content

CVE-2025-59345: CWE-306: Missing Authentication for Critical Function in dragonflyoss dragonfly

Low
VulnerabilityCVE-2025-59345cvecve-2025-59345cwe-306
Published: Wed Sep 17 2025 (09/17/2025, 19:05:53 UTC)
Source: CVE Database V5
Vendor/Project: dragonflyoss
Product: dragonfly

Description

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, The /api/v1/jobs and /preheats endpoints in Manager web UI are accessible without authentication. Any user with network access to the Manager can create, delete, and modify jobs, and create preheat jobs. An unauthenticated adversary with network access to a Manager web UI uses /api/v1/jobs endpoint to create hundreds of useless jobs. The Manager is in a denial-of-service state, and stops accepting requests from valid administrators. This vulnerability is fixed in 2.1.0.

AI-Powered Analysis

AILast updated: 09/17/2025, 19:37:37 UTC

Technical Analysis

CVE-2025-59345 is a vulnerability identified in the Dragonfly open source project, specifically affecting versions prior to 2.1.0. Dragonfly is a peer-to-peer (P2P) based file distribution and image acceleration system commonly used to optimize delivery of large files and container images. The vulnerability arises from missing authentication controls on critical Manager web UI endpoints: /api/v1/jobs and /preheats. These endpoints allow management of job creation, deletion, modification, and preheat job creation. Because these endpoints are accessible without any authentication, any user with network access to the Manager interface can perform these actions without restriction. An attacker can exploit this by creating a large number of useless jobs via the /api/v1/jobs endpoint, overwhelming the Manager and causing a denial-of-service (DoS) condition. This DoS state prevents legitimate administrators from managing jobs or accessing the Manager effectively. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating a failure to enforce authentication on sensitive operations. The CVSS 4.0 base score is 2.7 (low severity), reflecting that the attack requires network access but no privileges or user interaction, and the impact is limited to availability degradation (denial-of-service) without direct confidentiality or integrity compromise. The flaw was fixed in Dragonfly version 2.1.0 by introducing proper authentication controls on these endpoints. There are no known exploits in the wild as of the published date, and no patch links were provided in the source information. This vulnerability primarily impacts environments where Dragonfly Manager is exposed to untrusted networks or insufficiently segmented internal networks, allowing unauthenticated users to reach the vulnerable endpoints.

Potential Impact

For European organizations using Dragonfly versions prior to 2.1.0, this vulnerability poses a risk of service disruption due to denial-of-service attacks against the Manager component. The impact is availability degradation, which could interrupt file distribution and image acceleration workflows critical for DevOps pipelines, continuous integration/continuous deployment (CI/CD), and containerized application delivery. While confidentiality and integrity are not directly affected, the inability to manage jobs can delay operations and increase operational costs. Organizations with Dragonfly Manager interfaces exposed to broader internal networks or insufficiently protected network segments are at higher risk. This could affect cloud service providers, software development firms, and enterprises relying on Dragonfly for efficient content distribution. The low CVSS score suggests limited risk if proper network segmentation and access controls are in place. However, in environments where Dragonfly Manager is accessible to many users or exposed externally, the risk of disruption is more significant. Given the increasing adoption of container technologies and image acceleration in Europe, the vulnerability could impact critical infrastructure and services if not remediated.

Mitigation Recommendations

1. Upgrade Dragonfly to version 2.1.0 or later, where authentication is enforced on the Manager web UI endpoints. This is the definitive fix. 2. Restrict network access to the Dragonfly Manager interface using firewall rules, VPNs, or zero-trust network segmentation to limit access only to trusted administrators and systems. 3. Implement network-level authentication and access controls, such as IP whitelisting or mutual TLS, to reduce exposure of the Manager endpoints. 4. Monitor network traffic and logs for unusual activity targeting /api/v1/jobs and /preheats endpoints, such as a sudden surge in job creation requests, which may indicate exploitation attempts. 5. If upgrading immediately is not feasible, consider deploying a reverse proxy or web application firewall (WAF) in front of the Manager UI to enforce authentication or block unauthenticated requests to sensitive endpoints. 6. Educate administrators and DevOps teams about this vulnerability and ensure that operational procedures include verification of Dragonfly version and access controls. 7. Regularly audit and review network exposure of internal management interfaces to prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-12T12:36:24.636Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cb0df12a0094034ff87a55

Added to database: 9/17/2025, 7:37:21 PM

Last enriched: 9/17/2025, 7:37:37 PM

Last updated: 9/17/2025, 8:18:09 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats