Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59349: CWE-732: Incorrect Permission Assignment for Critical Resource in dragonflyoss dragonfly

0
Low
VulnerabilityCVE-2025-59349cvecve-2025-59349cwe-732
Published: Wed Sep 17 2025 (09/17/2025, 19:41:03 UTC)
Source: CVE Database V5
Vendor/Project: dragonflyoss
Product: dragonfly

Description

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, DragonFly2 uses the os.MkdirAll function to create certain directory paths with specific access permissions. This function does not perform any permission checks when a given directory path already exists. This allows a local attacker to create a directory to be used later by DragonFly2 with broad permissions before DragonFly2 does so, potentially allowing the attacker to tamper with the files. This vulnerability is fixed in 2.1.0.

AI-Powered Analysis

AILast updated: 09/25/2025, 00:39:23 UTC

Technical Analysis

CVE-2025-59349 is a vulnerability identified in the Dragonfly open source project, a peer-to-peer (P2P) based file distribution and image acceleration system. The issue exists in versions prior to 2.1.0 and relates to incorrect permission assignment for critical resources, specifically directories created by the software. Dragonfly2 uses the Go language function os.MkdirAll to create directory paths with intended specific access permissions. However, os.MkdirAll does not verify or enforce permissions if the directory already exists. This behavior allows a local attacker to pre-create directories with overly permissive access rights before Dragonfly2 attempts to create them. Consequently, the attacker can manipulate or tamper with files within these directories, potentially compromising the integrity of the data managed by Dragonfly. The vulnerability is classified under CWE-732, which concerns improper permission assignment for critical resources. The CVSS 4.0 base score is 2.0, indicating a low severity level, primarily because exploitation requires local access, no privileges, and no user interaction, and the impact is limited to integrity with no confidentiality or availability impact. No known exploits are reported in the wild, and the issue is fixed in Dragonfly version 2.1.0. This vulnerability highlights the risks of relying on directory creation functions that do not validate existing permissions, especially in software managing critical file distribution tasks.

Potential Impact

For European organizations using Dragonfly versions prior to 2.1.0, this vulnerability could allow a local attacker—such as a malicious insider or an attacker who has gained limited local access—to tamper with files distributed or cached by Dragonfly. This could undermine the integrity of software images or files distributed across internal networks or cloud environments, potentially leading to deployment of altered or malicious content. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise could have downstream effects, such as introducing backdoors or corrupted files into production environments. Organizations relying on Dragonfly for critical infrastructure or software delivery pipelines may face risks to operational reliability and trustworthiness of distributed content. However, the low CVSS score and requirement for local access limit the scope of impact, making remote exploitation or widespread disruption unlikely. Nonetheless, in environments with shared systems or multi-tenant setups, the risk of privilege escalation or lateral movement through tampered files should be considered.

Mitigation Recommendations

European organizations should upgrade Dragonfly to version 2.1.0 or later, where this vulnerability is fixed. Until upgrading is possible, organizations should implement strict local access controls to limit who can create or modify directories used by Dragonfly. File system monitoring and integrity checking tools can be deployed to detect unauthorized changes to directories and files managed by Dragonfly. Additionally, running Dragonfly processes with the least privilege necessary and isolating them in containers or sandboxed environments can reduce the risk of local tampering. Administrators should audit existing directory permissions to ensure no overly permissive directories exist that could be exploited. Incorporating automated deployment pipelines with cryptographic verification of distributed files can help detect tampering resulting from this vulnerability. Finally, organizations should educate local users about the risks of unauthorized directory creation and monitor logs for suspicious local activity related to Dragonfly directories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-12T12:36:24.637Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cb0fb22139234af51c2bd0

Added to database: 9/17/2025, 7:44:50 PM

Last enriched: 9/25/2025, 12:39:23 AM

Last updated: 10/31/2025, 4:26:24 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats