CVE-2025-59349: CWE-732: Incorrect Permission Assignment for Critical Resource in dragonflyoss dragonfly
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, DragonFly2 uses the os.MkdirAll function to create certain directory paths with specific access permissions. This function does not perform any permission checks when a given directory path already exists. This allows a local attacker to create a directory to be used later by DragonFly2 with broad permissions before DragonFly2 does so, potentially allowing the attacker to tamper with the files. This vulnerability is fixed in 2.1.0.
AI Analysis
Technical Summary
CVE-2025-59349 is a vulnerability identified in the Dragonfly open source project, a peer-to-peer (P2P) based file distribution and image acceleration system. The issue arises in versions prior to 2.1.0 due to the way Dragonfly uses the os.MkdirAll function to create directory paths with specific access permissions. The os.MkdirAll function does not verify or enforce permission checks if the directory path already exists. This behavior allows a local attacker to pre-create directories with overly permissive access rights before Dragonfly attempts to create them. Consequently, the attacker can exploit these broad permissions to tamper with files that Dragonfly later uses or manages. This vulnerability is categorized under CWE-732, which relates to incorrect permission assignment for critical resources. The flaw does not require authentication or user interaction and is exploitable only by local attackers, limiting the attack vector to those with local system access. The CVSS 4.0 score is 2 (low severity), reflecting limited impact and exploitability. The vulnerability was fixed in Dragonfly version 2.1.0 by presumably ensuring proper permission checks or secure directory creation methods. No known exploits are currently reported in the wild. This vulnerability primarily threatens the integrity of files managed by Dragonfly, as unauthorized modification could lead to corrupted or maliciously altered data within the file distribution system. Confidentiality and availability impacts are minimal or nonexistent. Given the local access requirement and the low CVSS score, the threat is considered low risk but should be addressed to prevent potential local privilege escalation or data tampering scenarios within environments using vulnerable Dragonfly versions.
Potential Impact
For European organizations using Dragonfly versions prior to 2.1.0, the vulnerability poses a risk mainly to the integrity of files distributed or cached by the system. If an attacker gains local access—such as through compromised user credentials, insider threats, or lateral movement within a network—they could manipulate directory permissions to tamper with critical files. This could lead to distribution of corrupted or malicious content, undermining trust in software delivery or image acceleration processes. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise could have downstream effects, such as deployment of compromised software or images, potentially leading to broader security incidents. Organizations relying on Dragonfly for internal or external content distribution should be aware that local attackers can exploit this flaw to interfere with file integrity. However, the requirement for local access limits the scope of impact primarily to environments where attackers can already execute code or commands on affected hosts. European organizations with strict internal access controls and monitoring may mitigate risk, but those with less mature endpoint security could be more vulnerable. The low CVSS score reflects the limited exploitability and impact, but the potential for file tampering in critical distribution systems warrants timely remediation.
Mitigation Recommendations
1. Upgrade Dragonfly to version 2.1.0 or later, where the vulnerability is fixed. This is the most effective and straightforward mitigation. 2. Restrict local access to systems running Dragonfly by enforcing strict user permissions and limiting administrative privileges to trusted personnel only. 3. Implement file system monitoring and integrity verification tools to detect unauthorized changes to directories and files managed by Dragonfly. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and prevent suspicious local activities that could exploit this vulnerability. 5. Review and harden directory permissions on existing Dragonfly installations to ensure they do not have overly permissive settings, especially on directories used by Dragonfly for file storage or caching. 6. Conduct regular audits of local user accounts and their access rights on systems running Dragonfly to minimize the risk of local attacker presence. 7. If upgrading is not immediately possible, consider isolating Dragonfly services in containers or virtual machines with strict access controls to limit local attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy
CVE-2025-59349: CWE-732: Incorrect Permission Assignment for Critical Resource in dragonflyoss dragonfly
Description
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, DragonFly2 uses the os.MkdirAll function to create certain directory paths with specific access permissions. This function does not perform any permission checks when a given directory path already exists. This allows a local attacker to create a directory to be used later by DragonFly2 with broad permissions before DragonFly2 does so, potentially allowing the attacker to tamper with the files. This vulnerability is fixed in 2.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-59349 is a vulnerability identified in the Dragonfly open source project, a peer-to-peer (P2P) based file distribution and image acceleration system. The issue arises in versions prior to 2.1.0 due to the way Dragonfly uses the os.MkdirAll function to create directory paths with specific access permissions. The os.MkdirAll function does not verify or enforce permission checks if the directory path already exists. This behavior allows a local attacker to pre-create directories with overly permissive access rights before Dragonfly attempts to create them. Consequently, the attacker can exploit these broad permissions to tamper with files that Dragonfly later uses or manages. This vulnerability is categorized under CWE-732, which relates to incorrect permission assignment for critical resources. The flaw does not require authentication or user interaction and is exploitable only by local attackers, limiting the attack vector to those with local system access. The CVSS 4.0 score is 2 (low severity), reflecting limited impact and exploitability. The vulnerability was fixed in Dragonfly version 2.1.0 by presumably ensuring proper permission checks or secure directory creation methods. No known exploits are currently reported in the wild. This vulnerability primarily threatens the integrity of files managed by Dragonfly, as unauthorized modification could lead to corrupted or maliciously altered data within the file distribution system. Confidentiality and availability impacts are minimal or nonexistent. Given the local access requirement and the low CVSS score, the threat is considered low risk but should be addressed to prevent potential local privilege escalation or data tampering scenarios within environments using vulnerable Dragonfly versions.
Potential Impact
For European organizations using Dragonfly versions prior to 2.1.0, the vulnerability poses a risk mainly to the integrity of files distributed or cached by the system. If an attacker gains local access—such as through compromised user credentials, insider threats, or lateral movement within a network—they could manipulate directory permissions to tamper with critical files. This could lead to distribution of corrupted or malicious content, undermining trust in software delivery or image acceleration processes. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise could have downstream effects, such as deployment of compromised software or images, potentially leading to broader security incidents. Organizations relying on Dragonfly for internal or external content distribution should be aware that local attackers can exploit this flaw to interfere with file integrity. However, the requirement for local access limits the scope of impact primarily to environments where attackers can already execute code or commands on affected hosts. European organizations with strict internal access controls and monitoring may mitigate risk, but those with less mature endpoint security could be more vulnerable. The low CVSS score reflects the limited exploitability and impact, but the potential for file tampering in critical distribution systems warrants timely remediation.
Mitigation Recommendations
1. Upgrade Dragonfly to version 2.1.0 or later, where the vulnerability is fixed. This is the most effective and straightforward mitigation. 2. Restrict local access to systems running Dragonfly by enforcing strict user permissions and limiting administrative privileges to trusted personnel only. 3. Implement file system monitoring and integrity verification tools to detect unauthorized changes to directories and files managed by Dragonfly. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and prevent suspicious local activities that could exploit this vulnerability. 5. Review and harden directory permissions on existing Dragonfly installations to ensure they do not have overly permissive settings, especially on directories used by Dragonfly for file storage or caching. 6. Conduct regular audits of local user accounts and their access rights on systems running Dragonfly to minimize the risk of local attacker presence. 7. If upgrading is not immediately possible, consider isolating Dragonfly services in containers or virtual machines with strict access controls to limit local attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-12T12:36:24.637Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cb0fb22139234af51c2bd0
Added to database: 9/17/2025, 7:44:50 PM
Last enriched: 9/17/2025, 7:45:10 PM
Last updated: 9/17/2025, 7:49:30 PM
Views: 3
Related Threats
CVE-2025-10619: OS Command Injection in sequa-ai sequa-mcp
MediumCVE-2025-10618: SQL Injection in itsourcecode Online Clinic Management System
MediumCVE-2025-8006: CWE-125: Out-of-bounds Read in Ashlar-Vellum Cobalt
HighCVE-2025-8005: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Ashlar-Vellum Cobalt
HighCVE-2025-8004: CWE-125: Out-of-bounds Read in Ashlar-Vellum Cobalt
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.