Описание
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.
Уязвимые конфигурации
Конфигурация 1Версия до 2.1.0 (исключая)
cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:*
EPSS
Процентиль: 5%
0.00022
Низкий
3.7 Low
CVSS3
Дефекты
CWE-311
Связанные уязвимости
CVSS3: 3.7
github
5 месяцев назад
DragonFly's tiny file download uses hard coded HTTP protocol
EPSS
Процентиль: 5%
0.00022
Низкий
3.7 Low
CVSS3
Дефекты
CWE-311