Skip to content

Security Report on Vulnerabilities Identified Through Prisma Scan #96

@aditya-mayo

Description

@aditya-mayo

1. Introduction
This report summarizes the vulnerabilities identified through the Prisma scan conducted.
The identified vulnerabilities have been categorized based on their severity levels, potential impacts, and recommended actions for remediation.

2. Vulnerabilities

2.1 High Vulnerabilities

Vulnerability: CVE-2025-61729
Description: Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

Vulnerability: CVE-2025-4674
Description: The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.

Vulnerability: CVE-2025-58188
Description: Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.

Vulnerability: CVE-2025-22868
Description: An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

Vulnerability: CVE-2025-61723
Description: The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.

3. How to reproduce it (as minimally and precisely as possible):
Scan your image via Prisma and you will see the issues.

Affected versions: v0.6.0 , v0.2.0

Image Image Image Image Image

4. Conclusion
The Prisma scan identified several vulnerabilities in the environment.
Immediate attention should be given to critical and high-severity vulnerabilities to mitigate potential risks.
Medium and low-severity vulnerabilities should also be addressed in a timely manner to strengthen the security posture.
Continuous monitoring and regular vulnerability assessments are recommended to ensure ongoing security.

Please review this report and prioritize the remediation efforts accordingly.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions