Remix.run Logo
woodruffw 2 hours ago

This is a great writeup, kudos for the PostHog folks.

Curious: would you be able to make your original exploitable workflow available for analysis? You note that a static analysis tool flagged it as potentially exploitable, but that the finding was suppressed under the belief that it was a false positive. I'm curious if there are additional indicators the tool could have detected that would have reduced the likelihood of premature suppression here.

(I tried to search for it, but couldn't immediately find it. I might be looking in the wrong repository, though.)

helpfulrobot an hour ago | parent [-]

Here's the PR that introduced the vulnerability: https://github.com/PostHog/posthog/pull/37915

duck2 27 minutes ago | parent [-]

It's a bit funny the vuln was introduced by someone with the username "haacked"