This document contains important information regarding security vulnerabilities that could affect some versions of New Relic products. Security bulletins are a way for New Relic to let users know about security vulnerabilities, remediation strategies, and applicable updates for affected software.
Select the title of the vulnerability for more information.
|5/30/2017||NR17-05||Agent may capture full SQL queries when an exception occurs||Java agent||High|
|5/5/2017||NR17-04||Agent captures WCF service request parameters during a TransactionError||.NET agent||Medium|
|2/9/2017||NR17-03||MongoDB aggregate queries not obfuscated||Ruby agent||Low|
|1/12/2017||NR17-02||Query parameters not removed from referer attribute in error trace||.NET agent||Medium|
|1/12/2017||NR17-01||Query parameters not removed from referer attribute in error trace||Node.js agent||Medium|
Report security vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. We believe that coordinated disclosure by security researchers and engaging with the security community is an important means of achieving our security goals.
If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:
Agent security vulnerability ratings
A vulnerability in the New Relic agent that could be exploited to compromise the confidentiality or integrity of application data.
|High||Atypical or unintended information is likely to be received by New Relic, potentially compromising the confidentiality or integrity of application data.|
|Medium||Atypical or unintended information could be received by New Relic, but the risk of compromise is mitigated by default configuration or standard security practices.|
|Low||Atypical or unintended information may be received by New Relic, but the vulnerability would be difficult to exploit or have minimal impact.|
For more help
Additional documentation resources include: