The Road to Hell is Paved with TODOs: Unauthenticated Access in Dragonfly
Vulnerability ID: CVE-2026-24124
CVSS Score: 8.9
Published: 2026-01-22
A critical oversight in the Dragonfly Manager component allowed unauthenticated attackers to access the Job API. Due to a missing middleware configuration explicitly marked with a 'TODO' comment, threat actors could trigger arbitrary file downloads ('preheat' jobs), delete active tasks, and inspect sensitive configuration data without any credentials.
TL;DR
Developers left a 'TODO: Add auth' comment on the Job API routes but forgot to implement it. This allows anyone with network access to the Dragonfly Manager (port 8080) to control background jobs. Attackers can abuse the 'preheat' feature to launch DoS attacks or exhaust cluster storage. Fixed in version 2.4.1-rc.1.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-306 (Missing Authentication)
- CVSS v4.0: 8.9 (High)
- Attack Vector: Network
- Privileges Required: None
- Impact: Logical RCE / DoS
- Patch Commit: 9fb9a2dfde3100f32dc7f48eabee4c2b64eac55f
Affected Systems
- Dragonfly Manager (v2.x series <= 2.4.1-rc.0)
-
Dragonfly Manager: <= 2.4.1-rc.0 (Fixed in:
2.4.1-rc.1)
Code Analysis
Commit: 9fb9a2d
feat(manager): add auth for job router
- job := apiv1.Group("/jobs")
+ job := apiv1.Group("/jobs", jwt.MiddlewareFunc(), rbac)
Exploit Details
- Internal Research: Direct curl requests to /api/v1/jobs demonstrate lack of authentication.
Mitigation Strategies
- Immediate upgrade to patched version
- Network segmentation via Kubernetes NetworkPolicy
- API Gateway / Reverse Proxy authentication
Remediation Steps:
- Pull the latest Dragonfly Manager image (>= 2.4.1-rc.1).
- Redeploy the Manager component.
- Verify the fix by attempting a curl request to /api/v1/jobs without a header; it should return 401 Unauthorized.
- If you rely on automated scripts to create jobs, generate a Personal Access Token (PAT) or configure
DRAGONFLY_PAT.
References
Read the full report for CVE-2026-24124 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)