First published: Tue Oct 15 2024(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the database_schema method. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to execute code in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
PostHog |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-25351 is currently classified as high due to the potential for sensitive information disclosure.
To fix ZDI-CAN-25351, ensure that you update to the latest version of PostHog where the vulnerability has been addressed.
ZDI-CAN-25351 affects installations of PostHog that do not have the required updates, particularly those that use the vulnerable database_schema method.
Yes, authentication is required to exploit ZDI-CAN-25351, allowing attackers to access sensitive information.
ZDI-CAN-25351 specifically affects the implementation of the database_schema method within PostHog, leading to potential information disclosure.