Summary
A security update for New Relic's Java agent fixes a vulnerability where the agent could unintentionally capture full SQL queries when SQL obfuscation is enabled.
Release date: May 30, 2017
Vulnerability identifier: NR17-05
Priority: High
Affected software
The following New Relic agent versions are affected:
Name | Affected version | Notes | Remediated version |
---|---|---|---|
Java agent | 3.0.0-3.39.0 | With SQL obfuscation |
Vulnerability information
New Relic’s Java agent can be configured to obfuscate SQL query information. This setting is forced when high-security mode is enabled. New Relic has found that, when an exception is thrown during the query, full SQL query information may still be captured as part of the error trace when SQL obfuscation is enabled. A fix has been made to disable the collection of this information during error collection. Customers are encouraged to upgrade to the latest version of the Java agent.
Mitigating factors
- Only Java agents using SQL obfuscation are affected.
Workarounds
New Relic has not identified any workarounds for this vulnerability.
Report security vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.
For more help
Additional documentation resources include:.