Security Bulletin NR17-06

Summary

A security update for New Relic's .NET agent fixes a vulnerability where the agent could unintentionally capture query parameters from external HTTP requests during a transaction trace.

Release date: Dec 18, 2017

Vulnerability identifier: NR17-06

Priority: Medium

Affected software

The following New Relic agent versions are affected:

Name Affected version Notes Remediated version
.NET agent 5.11.0 - 6.19.330 Transaction Trace 6.20.166.0

Vulnerability information

New Relic’s .NET agent captures a transaction trace to get detailed information about a single transaction including function calls, database calls, and external calls. By default, the agent should not collect the details of external calls (HTTP requests). Previous versions of the agent will collect the external http request parameters which may contain sensitive information. This release fixes the default behavior of the .NET agent to not collect the request parameters of external HTTP requests.

Mitigating factors

  • Query parameters used in external HTTP requests made using HttpClient, WebRequest, or other library that uses these calls.

  • Transaction Trace enabled (default setting)

Workarounds

Disable transaction trace in the .NET agent configuration.

Report vulnerabilities to New Relic

New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.

If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:

For more help

Additional documentation resources include:.

Recommendations for learning more: