A security update for New Relic's Node.js agent eliminates a vulnerability that allows potential sensitive information disclosure via query parameters from the referer header.
Release date: January 12, 2017
Vulnerability identifier: NR17-01
The following New Relic agent versions are affected:
|Name||Affected version||Notes||Remediated version|
New Relic's Node.js agent collects the request headers during an error trace to help determine the root cause of problems. The referer header is the URI that identifies the address of the webpage that linked to the resource being requested. It is possible that the referer URI may contain sensitive information in the request query parameters. New Relic has found that the query parameters are not properly stripped during the error trace. This update fixes this by stripping the query parameters from the referer in the request header before sending this data to New Relic.
- Best practices recommend not using query parameters to pass sensitive data.
New Relic has not identified any workarounds for this vulnerability.
Report vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.
If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:
For more help
Additional documentation resources include:.