Skip to content

[Bug]: Security Report on Vulnerabilities Identified Through Prisma Scan #2904

@aditya-mayo

Description

@aditya-mayo

Introduction
This report summarizes the vulnerabilities identified through the Prisma scan conducted.
The identified vulnerabilities have been categorized based on their severity levels, potential impacts, and recommended actions for remediation.

Steps to reproduce

How to reproduce it (as minimally and precisely as possible):
Scan your image via Prisma and you will see the issues.

Affected versions: 1.65.0, 1.62.0, 1.61.0

Vulnerabilities

Critical Vulnerabilities

Vulnerability: CVE-2024-24790
Description: The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.

High Vulnerabilities

Vulnerability: CVE-2025-47273
Description: A path traversal vulnerability in PackageIndex was fixed in setuptools version 78.1.1

Vulnerability: CVE-2025-22868
Description: It seems to target oauth2/jws library.

Vulnerability: CVE-2022-40897
Description: Python Packaging Authority (PyPA)'s setuptools is a library designed to facilitate packaging Python projects. Setuptools version 65.5.0 and earlier could allow remote attackers to cause a denial of service by fetching malicious HTML from a PyPI package or custom PackageIndex page due to a vulnerable Regular Expression in package_index. This has been patched in version 65.5.1.

Vulnerability: CVE-2024-6345
Description: A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.

Screenshot

The Prisma scan identified several vulnerabilities in the environment.
Immediate attention should be given to critical and high-severity vulnerabilities to mitigate potential risks.
Medium and low-severity vulnerabilities should also be addressed in a timely manner to strengthen the security posture.
Continuous monitoring and regular vulnerability assessments are recommended to ensure ongoing security.

See screenshot for more details

Please review this report and prioritize the remediation efforts accordingly.

Image Image Image Image Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions