logoalt Hacker News

Inside PostHog: SSRF, ClickHouse SQL Escape and Default Postgres Creds to RCE

104 pointsby arwtyesterday at 8:50 PM35 commentsview on HN

Comments

piccirellotoday at 12:10 AM

I work on security at PostHog. We resolved these SSRF findings back in October 2024 when this report was responsibly disclosed to us. I'm currently gathering the relevant PRs so that we can share them here. We're also working on some architectural improvements around egress, namely using smokescreen, to better protect against this class of issue.

show 1 reply
anothercatyesterday at 11:02 PM

Does this require authenticated access to the posthog api to kick off? In that case I feel clickhouse and posthog both have their share of the blame here.

show 1 reply
lktyesterday at 10:18 PM

Out of interest, how much does ZDI pay for a bug like this?

show 1 reply
yellow_leadtoday at 5:17 AM

Need an edit here

> As it described on Clickhouse documentation, their API is designed to be READ ONLY on any operation for HTTP GET As described in the Clickhouse documentation, their API is designed to be READ ONLY on any operation for HTTP GET requests.

show 1 reply
thenaturalistyesterday at 9:49 PM

Wow, chapeau to the author.

What an elegant, interesting read.

What I don't quite understand: Why is the Clickhouse bug not given more scrutiny?

Like that escape bug was what made the RCE possible and certainly a core DB company like ClickHouse should be held accountable for such an oversight?

show 2 replies
danr4today at 9:13 AM

Very nice write up!

show 1 reply
taw_1265yesterday at 9:45 PM

PostHog does a lot of vibe coding, I wonder how many other issues they have.

show 1 reply