Inside PostHog: SSRF, ClickHouse SQL Escape and Default Postgres Creds to RCE

mdisec.com

100 points by arwt 18 hours ago


piccirello - 15 hours ago

I work on security at PostHog. We resolved these SSRF findings back in October 2024 when this report was responsibly disclosed to us. I'm currently gathering the relevant PRs so that we can share them here. We're also working on some architectural improvements around egress, namely using smokescreen, to better protect against this class of issue.

yellow_lead - 9 hours ago

Need an edit here

> As it described on Clickhouse documentation, their API is designed to be READ ONLY on any operation for HTTP GET As described in the Clickhouse documentation, their API is designed to be READ ONLY on any operation for HTTP GET requests.

lkt - 16 hours ago

Out of interest, how much does ZDI pay for a bug like this?

- 18 hours ago
[deleted]
anothercat - 16 hours ago

Does this require authenticated access to the posthog api to kick off? In that case I feel clickhouse and posthog both have their share of the blame here.

thenaturalist - 17 hours ago

Wow, chapeau to the author.

What an elegant, interesting read.

What I don't quite understand: Why is the Clickhouse bug not given more scrutiny?

Like that escape bug was what made the RCE possible and certainly a core DB company like ClickHouse should be held accountable for such an oversight?

danr4 - 5 hours ago

Very nice write up!

- 13 hours ago
[deleted]
taw_1265 - 17 hours ago

PostHog does a lot of vibe coding, I wonder how many other issues they have.