-
Notifications
You must be signed in to change notification settings - Fork 72
Description
Advisory GHSA-79hx-3fp8-hj66 references a vulnerability in the following Go modules:
Module |
---|
d7y.io/dragonfly/v2 |
github.com/dragonflyoss/dragonfly |
Description:
Impact
A peer exposes the gRPC API and HTTP API for consumption by other peers. These APIs allow peers to send requests that force the recipient peer to create files in arbitrary file system locations, and to read arbitrary files. This allows peers to steal other peers’ secret data and to gain remote code execution (RCE) capabilities on the peer’s machine.
file, err := os.OpenFile(t.DataFilePath, os.O_RDWR, defaultFileMode)
if err != nil {
return 0, err
}
defer file.Close()
if _, err = file.Seek(req.Range.Start, io.SeekStart); err != nil {
return 0, err
}
n, er...
References:
- ADVISORY: https://github.com/advisories/GHSA-79hx-3fp8-hj66
- ADVISORY: https://github.com/dragonflyoss/dragonfly/security/advisories/GHSA-79hx-3fp8-hj66
- WEB: https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf
Cross references:
- d7y.io/dragonfly/v2 appears in 1 other report(s):
- data/reports/GO-2024-3136.yaml (https://github.com/golang/vulndb/issues/3136)
See [doc/quickstart.md](https://github.com/golang/vulndb/blob/master/doc/quickstart.md) for instructions on how to triage this report.
id: GO-ID-PENDING
modules:
- module: d7y.io/dragonfly/v2
versions:
- fixed: 2.1.0
vulnerable_at: 2.1.0-rc.0
- module: github.com/dragonflyoss/dragonfly
vulnerable_at: 1.0.6
summary: DragonFly vulnerable to arbitrary file read and write on a peer machine in d7y.io/dragonfly
cves:
- CVE-2025-59352
ghsas:
- GHSA-79hx-3fp8-hj66
references:
- advisory: GHSA-79hx-3fp8-hj66
- advisory: GHSA-79hx-3fp8-hj66
- web: https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf
source:
id: GHSA-79hx-3fp8-hj66
created: 2025-09-17T21:01:19.632672558Z
review_status: UNREVIEWED