Security Bulletin NR18-01


A security update for the Python agent to prevent a developer from accidentally capturing custom API parameters in High Security Mode.

Release date: Jan 9, 2018

Vulnerability identifier: NR18-01

Priority: Medium

Affected software

The following New Relic agent versions are affected:

Name Affected version Notes Remediated version
Python Agent High Security Mode

Vulnerability information

An internal audit of the Python High Security Mode revealed that the agent could send additional data to New Relic by customizing message params with the tracing APIs. Custom parameters may be sent to New Relic if a developer is passing additional parameters using either the function trace API or the message trace API. These should be disabled when High Security Mode is enabled.

Mitigating factors

  • This only affects customers that have enabled High Security Mode with the Python agent and a developer is adding additional information to the tracing API.


If you are unable to upgrade the agent, you may be able to take the following action to ensure you do not send any additional data in High Security Mode.

Report vulnerabilities to New Relic

New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.

If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:

For more help

Additional documentation resources include:.

Recommendations for learning more: