GHSA-255v-qv84-29p5

Suggest an improvement
Source
https://github.com/advisories/GHSA-255v-qv84-29p5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-255v-qv84-29p5/GHSA-255v-qv84-29p5.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-255v-qv84-29p5
Aliases
Published
2025-09-17T20:11:37Z
Modified
2025-09-26T16:19:18Z
Severity
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
DragonFly's manager generates mTLS certificates for arbitrary IP addresses
Details

Impact

A peer can obtain a valid TLS certificate for arbitrary IP addresses, effectively rendering the mTLS authentication useless. The issue is that the Manager’s Certificate gRPC service does not validate if the requested IP addresses “belong to” the peer requesting the certificate—that is, if the peer connects from the same IP address as the one provided in the certificate request.

if addr, ok := p.Addr.(*net.TCPAddr); ok {
       ip = addr.IP.String()
} else {
       ip, _, err = net.SplitHostPort(p.Addr.String())
       if err != nil {
             return nil, err
       }
}
// Parse csr.
[skipped]
// Check csr signature.
// TODO check csr common name and so on.
if err = csr.CheckSignature(); err != nil {
       return nil, err
}
[skipped]
// TODO only valid for peer ip
// BTW we need support both of ipv4 and ipv6.
ips := csr.IPAddresses
if len(ips) == 0 {
       // Add default connected ip.
       ips = []net.IP{net.ParseIP(ip)}
}

Patches

  • Dragonfy v2.1.0 and above.

Workarounds

There are no effective workarounds, beyond upgrading.

References

A third party security audit was performed by Trail of Bits, you can see the full report.

If you have any questions or comments about this advisory, please email us at dragonfly-maintainers@googlegroups.com.

Database specific
{
    "cwe_ids": [
        "CWE-295"
    ],
    "github_reviewed": true,
    "severity": "HIGH",
    "github_reviewed_at": "2025-09-17T20:11:37Z",
    "nvd_published_at": "2025-09-17T20:15:37Z"
}
References

Affected packages

Go / github.com/dragonflyoss/dragonfly

Package

Name
github.com/dragonflyoss/dragonfly
View open source insights on deps.dev
Purl
pkg:golang/github.com/dragonflyoss/dragonfly

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-255v-qv84-29p5/GHSA-255v-qv84-29p5.json"

Go / d7y.io/dragonfly/v2

Package

Name
d7y.io/dragonfly/v2
View open source insights on deps.dev
Purl
pkg:golang/d7y.io/dragonfly/v2

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-255v-qv84-29p5/GHSA-255v-qv84-29p5.json"