A security update for the .NET agent corrects an issue where certain character combinations may prevent query obfuscation when instrumenting Microsoft SQL Server.
Release date: April 22, 2019
Vulnerability identifier: NR19-03
The following New Relic agent versions are affected:
|Name||Affected version||Notes||Remediated version|
|.NET agent||< 220.127.116.11||18.104.22.168|
When configured to obfuscate SQL queries, the .NET agent will pass all queries through an obfuscation function. Due to the way Microsoft SQL Server sanitizes queries, certain character combinations may be generated that could cause this obfuscation to fail.
This vulnerability only exists when instrumenting Microsoft SQL Server and query obfuscation is enabled.
Disable database instrumentation.
- Update to the latest New Relic .NET agent.
Report vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. We believe that engaging with the security community is an important means of achieving our security goals, and we appreciate responsible disclosure of any vulnerabilities by security researchers.
If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic through one of these methods: