Security Bulletin NR17-05

Summary

A security update for New Relic's Java agent fixes a vulnerability where the agent could unintentionally capture full SQL queries when SQL obfuscation is enabled.

Release date: May 30, 2017

Vulnerability identifier: NR17-05

Priority: High

Affected software

The following New Relic agent versions are affected:

Name Affected version Notes Remediated version
Java agent 3.0.0-3.39.0 With SQL obfuscation 3.39.1

Vulnerability information

New Relic’s Java agent can be configured to obfuscate SQL query information. This setting is forced when high security mode is enabled. New Relic has found that, when an exception is thrown during the query, full SQL query information may still be captured as part of the error trace when SQL obfuscation is enabled. A fix has been made to disable the collection of this information during error collection. Customers are encouraged to upgrade to the latest version of the Java agent.

Mitigating factors

  • Only Java agents using SQL obfuscation are affected.

Workarounds

New Relic has not identified any workarounds for this vulnerability.

Report vulnerabilities to New Relic

New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.

If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:

For more help

Additional documentation resources include:.

Recommendations for learning more: