First published: Tue Oct 15 2024(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the database_schema method. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to execute code in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
PostHog |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1383 is classified as medium due to the potential for sensitive information disclosure.
To fix ZDI-24-1383, update your PostHog installation to the latest version where the vulnerability has been patched.
ZDI-24-1383 affects systems running affected versions of PostHog software.
Yes, ZDI-24-1383 requires authentication to exploit the vulnerability.
ZDI-24-1383 can potentially disclose sensitive information stored in the database due to the flaw in the database_schema method.