Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/dragonflyoss/dragonfly
  4. ›
  5. CVE-2025-59350

CVE-2025-59350: Dragonfly vulnerable to timing attacks against Proxy’s basic authentication

September 17, 2025 (updated September 18, 2025)

The access control mechanism for the Proxy feature uses simple string comparisons and is therefore vulnerable to timing attacks. An attacker may try to guess the password one character at a time by sending all possible characters to a vulnerable mechanism and measuring the comparison instruction’s execution times. The vulnerability is shown in figure 8.1, where both the username and password are compared with a short-circuiting equality operation.

if user != proxy.basicAuth.Username || pass != proxy.basicAuth.Password {

It is currently undetermined what an attacker may be able to do with access to the proxy password.

References

  • github.com/advisories/GHSA-c2fc-9q9c-5486
  • github.com/dragonflyoss/dragonfly
  • github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf
  • github.com/dragonflyoss/dragonfly/security/advisories/GHSA-c2fc-9q9c-5486
  • nvd.nist.gov/vuln/detail/CVE-2025-59350

Code Behaviors & Features

Detect and mitigate CVE-2025-59350 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.1.0

Fixed versions

  • 2.1.0

Solution

Upgrade to version 2.1.0 or above.

Weakness

  • CWE-208: Observable Timing Discrepancy
  • CWE-697: Incorrect Comparison

Source file

go/github.com/dragonflyoss/dragonfly/CVE-2025-59350.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 19 Sep 2025 00:21:06 +0000.