• /
  • ログイン

Security Bulletin NR17-05

Summary

A security update for New Relic's Java agent fixes a vulnerability where the agent could unintentionally capture full SQL queries when SQL obfuscation is enabled.

Release date: May 30, 2017

Vulnerability identifier: NR17-05

Priority: High

Affected software

The following New Relic agent versions are affected:

Name

Affected version

Notes

Remediated version

Java agent

3.0.0-3.39.0

With SQL obfuscation

3.39.1

Vulnerability information

New Relic’s Java agent can be configured to obfuscate SQL query information. This setting is forced when high security mode is enabled. New Relic has found that, when an exception is thrown during the query, full SQL query information may still be captured as part of the error trace when SQL obfuscation is enabled. A fix has been made to disable the collection of this information during error collection. Customers are encouraged to upgrade to the latest version of the Java agent.

Mitigating factors

  • Only Java agents using SQL obfuscation are affected.

Workarounds

New Relic has not identified any workarounds for this vulnerability.

Report security vulnerabilities to New Relic

New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.

For more help

Additional documentation resources include:.

その他のヘルプ

さらに支援が必要な場合は、これらのサポートと学習リソースを確認してください:

問題を作成するこのページを編集する
Copyright © 2020 New Relic Inc.