Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/dragonflyoss/dragonfly
  4. ›
  5. CVE-2025-59346

CVE-2025-59346: Dragonfly vulnerable to server-side request forgery

September 17, 2025

There are multiple server-side request forgery (SSRF) vulnerabilities in the DragonFly2 system. The vulnerabilities enable users to force DragonFly2’s components to make requests to internal services, which otherwise are not accessible to the users. One SSRF attack vector is exposed by the Manager’s API. The API allows users to create jobs. When creating a Preheat type of a job, users provide a URL that the Manager connects to (see figures 2.1–2.3). The URL is weakly validated, and so users can trick the Manager into sending HTTP requests to services that are in the Manager’s local network.

func (p *preheat) CreatePreheat(ctx context.Context, schedulers []models.Scheduler,
json types.PreheatArgs) (*internaljob.GroupJobState, error) {
[skipped]
url := json.URL
[skipped]
// Generate download files
var files []internaljob.PreheatRequest
switch PreheatType(json.Type) {
case PreheatImageType:
// Parse image manifest url
skipped, err := parseAccessURL(url) [skipped]
[skipped]
case PreheatFileType: [skipped]
}

A second attack vector is in peer-to-peer communication. A peer can ask another peer to make a request to an arbitrary URL by triggering the pieceManager.DownloadSource method (figure 2.4), which calls the httpSourceClient.GetMetadata method, which performs the request.

Another attack vector is due to the fact that HTTP clients used by the DragonFly2’s components do not disable support for HTTP redirects. This configuration means that an HTTP request sent to a malicious server may be redirected by the server to a component’s internal service.

References

  • github.com/advisories/GHSA-g2rq-jv54-wcpr
  • github.com/dragonflyoss/dragonfly
  • github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf
  • github.com/dragonflyoss/dragonfly/security/advisories/GHSA-g2rq-jv54-wcpr
  • nvd.nist.gov/vuln/detail/CVE-2025-59346

Code Behaviors & Features

Detect and mitigate CVE-2025-59346 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.1.0

Fixed versions

  • 2.1.0

Solution

Upgrade to version 2.1.0 or above.

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

go/github.com/dragonflyoss/dragonfly/CVE-2025-59346.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 18 Sep 2025 12:18:25 +0000.