Security Bulletin NR18-05

Summary

A security update for the Infrastructure agent to prevent capturing command line parameters.

Release date: Feb 8, 2018

Vulnerability identifier: NR18-05

Priority: High

Affected software

The following New Relic agent versions are affected:

Name Affected version Notes Remediated version
Infrastructure agent 1.0.822 - 1.0.872 Error trace 1.0.888

Vulnerability information

New Relic’s Infrastructure agent collects information about running processes, including process command lines. The default configuration setting strip_command_line: true should prevent additional command line parameters from being sent to New Relic. With some command line options, the agent will capture the additional command line parameters even with that setting enabled.

Mitigating factors

  • Generally, sensitive data will not be part of the command line options.

  • On Linux systems, the command line parameters will only be collected if the command line arguments (flags) have paths with a path separator element (/).

  • On Windows systems, the command line parameters will only be collected if the command line has switches starting with / or - and contain path separator elements (\).

Workarounds

The only solution for this issue is to update the Infrastructure agent.

Report vulnerabilities to New Relic

New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.

If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:

For more help

Additional documentation resources include:.

Recommendations for learning more: