A security update for the New Relic Infrastructure agent for Windows corrects an issue where the agent may follow unprivileged hard links or junction folders.
Release date: November 28, 2018
Vulnerability identifier: NR18-12
The following New Relic agent versions are affected:
|Name||Affected version||Notes||Remediated version|
Windows Infrastructure agent
The New Relic Windows Infrastructure agent writes to various files as part of its normal operation. An unprivileged user may be able to use Windows hard link or folder junction policies to point to files in privileged locations. This could cause the agent to create or append data to privileged files.
This vulnerability only exists on Windows systems.
Report vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.
If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods: