A security update for New Relic's Java agent fixes a vulnerability where the agent could unintentionally capture full SQL queries when SQL obfuscation is enabled.
Release date: May 30, 2017
Vulnerability identifier: NR17-05
The following New Relic agent versions are affected:
|Name||Affected version||Notes||Remediated version|
|Java agent||3.0.0-3.39.0||With SQL obfuscation||3.39.1|
New Relic’s Java agent can be configured to obfuscate SQL query information. This setting is forced when high security mode is enabled. New Relic has found that, when an exception is thrown during the query, full SQL query information may still be captured as part of the error trace when SQL obfuscation is enabled. A fix has been made to disable the collection of this information during error collection. Customers are encouraged to upgrade to the latest version of the Java agent.
- Only Java agents using SQL obfuscation are affected.
New Relic has not identified any workarounds for this vulnerability.
Report vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.
If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:
For more help
Additional documentation resources include:.