Summary
A security update for the Python agent to prevent a developer from accidentally capturing custom API parameters in High-security mode.
Release date: Jan 9, 2018
Vulnerability identifier: NR18-01
Priority: Medium
Affected software
The following New Relic agent versions are affected:
Name | Affected version | Notes | Remediated version |
---|---|---|---|
Python agent | High-security mode |
Vulnerability information
An internal audit of the Python High-security mode revealed that the agent could send additional data to New Relic by customizing message params with the tracing APIs. Custom parameters may be sent to New Relic if a developer is passing additional parameters using either the function trace API or the message trace API. These should be disabled when High-security mode is enabled.
Mitigating factors
- This only affects customers that have enabled High-security mode with the Python agent and a developer is adding additional information to the tracing API.
Workarounds
If you are unable to upgrade the agent, you may be able to take the following action to ensure you do not send any additional data in High-security mode.
- Remove any custom params to the function trace API or the message trace API.
Report security vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.
For more help
Additional documentation resources include:.