A security update for New Relic's Ruby agent fixes a vulnerability where the agent could unintentionally capture raw aggregate queries with MongoDB.
Release date: February 9, 2017
Vulnerability identifier: NR17-03
The following New Relic agent versions are affected:
|Name||Affected version||Notes||Remediated version|
|Ruby agent||3.13.1 (and greater)||With MongoDB driver 2.1 (and greater)||3.18.1|
New Relic’s Ruby Agent version 3.13.1 added visibility to MongoDB queries with version 2.1 and greater of the MongoDB driver for Ruby. The agent's default setting for mongo.obfuscate_queries is true. This should cause the agent to obfuscate the values in Mongo queries before sending this information to New Relic. However, when using the aggregate pipeline with this version of the driver, the aggregate queries were not properly obfuscated.
- Only customers who use version 2.1 and greater of the Ruby Driver for MongoDB are affected
- Aggregate queries generally do not contain sensitive information
Users who are affected and are unable to upgrade may choose to configure the Ruby agent to not capture mongoDB queries. Users can set mongo.capture_queries to false to prevent the agent from sending any information about the query.
Report vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.
If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:
For more help
Additional documentation resources include:.