A security update for the Python agent to prevent a developer from accidentally capturing custom API parameters in High Security Mode.
Release date: Jan 9, 2018
Vulnerability identifier: NR18-01
The following New Relic agent versions are affected:
|Name||Affected version||Notes||Remediated version|
|Python Agent||High Security Mode||184.108.40.206|
An internal audit of the Python High Security Mode revealed that the agent could send additional data to New Relic by customizing message params with the tracing APIs. Custom parameters may be sent to New Relic if a developer is passing additional parameters using either the function trace API or the message trace API. These should be disabled when High Security Mode is enabled.
This only affects customers that have enabled High Security Mode with the Python agent and a developer is adding additional information to the tracing API.
If you are unable to upgrade the agent, you may be able to take the following action to ensure you do not send any additional data in High Security Mode.
Report vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.
If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:
For more help
Additional documentation resources include:.