• /
  • EnglishEspañol日本語한국어Português
  • 로그인지금 시작하기

Security Bulletin NR18-05

Summary

A security update for the Infrastructure agent to prevent capturing command line parameters.

Release date: Feb 8, 2018

Vulnerability identifier: NR18-05

Priority: High

Affected software

The following New Relic agent versions are affected:

Name

Affected version

Notes

Remediated version

Infrastructure agent

1.0.822 - 1.0.872

Error trace

1.0.888

Vulnerability information

New Relic’s Infrastructure agent collects information about running processes, including process command lines. The default configuration setting strip_command_line: true should prevent additional command line parameters from being sent to New Relic. With some command line options, the agent will capture the additional command line parameters even with that setting enabled.

Mitigating factors

  • Generally, sensitive data will not be part of the command line options.
  • On Linux systems, the command line parameters will only be collected if the command line arguments (flags) have paths with a path separator element (/).
  • On Windows systems, the command line parameters will only be collected if the command line has switches starting with / or - and contain path separator elements (\).

Workarounds

The only solution for this issue is to update the Infrastructure agent.

Report security vulnerabilities to New Relic

New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.

For more help

Additional documentation resources include:.

Copyright © 2024 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.