Skip to main content

CVE-2025-59346: CWE-918: Server-Side Request Forgery (SSRF) in dragonflyoss dragonfly

Medium
VulnerabilityCVE-2025-59346cvecve-2025-59346cwe-918
Published: Wed Sep 17 2025 (09/17/2025, 19:20:23 UTC)
Source: CVE Database V5
Vendor/Project: dragonflyoss
Product: dragonfly

Description

Dragonfly is an open source P2P-based file distribution and image acceleration system. Versions prior to 2.1.0 contain a server-side request forgery (SSRF) vulnerability that enables users to force DragonFly2’s components to make requests to internal services that are otherwise not accessible to them. The issue arises because the Manager API accepts a user-supplied URL when creating a Preheat job with weak validation, peers can trigger other peers to fetch an arbitrary URL through pieceManager.DownloadSource, and internal HTTP clients follow redirects, allowing a request to a malicious server to be redirected to internal services. This can be used to probe or access internal HTTP endpoints. The vulnerability is fixed in version 2.1.0.

AI-Powered Analysis

AILast updated: 09/17/2025, 19:26:18 UTC

Technical Analysis

CVE-2025-59346 is a Server-Side Request Forgery (SSRF) vulnerability identified in dragonflyoss's Dragonfly, an open source peer-to-peer (P2P) file distribution and image acceleration system. This vulnerability affects all versions prior to 2.1.0. The core issue arises from insufficient validation of user-supplied URLs in the Manager API when creating a Preheat job. Specifically, the API accepts arbitrary URLs without proper sanitization, allowing malicious users to coerce Dragonfly components to initiate HTTP requests to internal network services that are otherwise inaccessible externally. Additionally, the pieceManager.DownloadSource functionality enables peers to trigger other peers to fetch arbitrary URLs. The vulnerability is exacerbated by the internal HTTP clients' behavior of following redirects, which can be exploited by attackers to redirect requests from a malicious external server to internal endpoints. This chain of weaknesses enables attackers to probe internal HTTP services, potentially exposing sensitive information or internal infrastructure details. The vulnerability has a CVSS 4.0 base score of 5.5 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality. There are no known exploits in the wild as of the publication date, and the issue is resolved in Dragonfly version 2.1.0.

Potential Impact

For European organizations utilizing Dragonfly for P2P file distribution or image acceleration, this SSRF vulnerability poses a risk of unauthorized internal network reconnaissance and potential information disclosure. Attackers could leverage this flaw to access internal HTTP endpoints that are not exposed externally, potentially revealing sensitive configuration data, internal APIs, or other protected services. While the vulnerability does not directly enable remote code execution or widespread system compromise, the ability to probe internal networks can facilitate further targeted attacks or lateral movement within an organization's infrastructure. Given the increasing adoption of containerized and microservices architectures in Europe, where internal service communication is common, this vulnerability could expose critical internal services if Dragonfly is deployed in such environments. The medium severity rating suggests a moderate risk, but the absence of required authentication and user interaction increases the likelihood of exploitation if the vulnerable Dragonfly instance is internet-facing or accessible by untrusted peers.

Mitigation Recommendations

European organizations should prioritize upgrading Dragonfly installations to version 2.1.0 or later, where this SSRF vulnerability is fixed. Until upgrades can be applied, organizations should implement strict network segmentation and firewall rules to restrict Dragonfly components' outbound HTTP requests to only trusted internal services. Additionally, deploying Web Application Firewalls (WAFs) or API gateways with URL validation can help detect and block malicious requests attempting to exploit this SSRF. Monitoring and logging outbound HTTP requests from Dragonfly peers can provide early detection of suspicious activity. Organizations should also review and harden the configuration of internal HTTP services to minimize sensitive data exposure. Finally, restricting access to the Manager API to authenticated and authorized users, even if not required by the vulnerability itself, can reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-12T12:36:24.636Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cb0b4650c37531b87a327c

Added to database: 9/17/2025, 7:25:58 PM

Last enriched: 9/17/2025, 7:26:18 PM

Last updated: 9/18/2025, 12:10:43 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats