Loading HuntDB...

GHSA-98x5-jw98-6c97

GitHub Security Advisory

Dragonfly's manager makes requests to external endpoints with disabled TLS authentication

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact

The Manager disables TLS certificate verification in two HTTP clients (figures 3.1 and 3.2). The clients are not configurable, so users have no way to re-enable the verification.

```golang
func getAuthToken(ctx context.Context, header http.Header) (string, error) { [skipped]
client := &http.Client{
Timeout: defaultHTTPRequesttimeout,
Transport: &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
},
}
[skipped]
}
```

A Manager processes dozens of preheat jobs. An adversary performs a network-level Man-in-the-Middle attack, providing invalid data to the Manager. The Manager preheats with the wrong data, which later causes a denial of service and file integrity problems.

### Patches

- Dragonfy v2.1.0 and above.

### Workarounds

There are no effective workarounds, beyond upgrading.

### References

A third party security audit was performed by Trail of Bits, you can see the [full report](https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf).

If you have any questions or comments about this advisory, please email us at [[email protected]](mailto:[email protected]).

Affected Packages

Go github.com/dragonflyoss/dragonfly
Affected versions: 0 (fixed in 2.1.0)

Related CVEs

Key Information

GHSA ID
GHSA-98x5-jw98-6c97
Published
September 17, 2025 7:28 PM
Last Modified
September 17, 2025 7:28 PM
CVSS Score
5.0 /10
Primary Ecosystem
Go
Primary Package
github.com/dragonflyoss/dragonfly
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 18, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.