A security update for the Infrastructure agent to prevent capturing command line parameters.
Release date: Feb 8, 2018
Vulnerability identifier: NR18-05
The following New Relic agent versions are affected:
|Name||Affected version||Notes||Remediated version|
|Infrastructure agent||1.0.822 - 1.0.872||Error trace||1.0.888|
New Relic’s Infrastructure agent collects information about running processes, including process command lines. The default configuration setting
strip_command_line: true should prevent additional command line parameters from being sent to New Relic. With some command line options, the agent will capture the additional command line parameters even with that setting enabled.
Generally, sensitive data will not be part of the command line options.
On Linux systems, the command line parameters will only be collected if the command line arguments (flags) have paths with a path separator element (
On Windows systems, the command line parameters will only be collected if the command line has switches starting with
-and contain path separator elements (
The only solution for this issue is to update the Infrastructure agent.
Report vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.
If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods:
For more help
Additional documentation resources include:.