First published: Tue Apr 09 2013(Updated: )
Ruby agent 3.2.0 through 3.5.2 serializes sensitive data when communicating with servers operated by New Relic, which allows remote attackers to obtain sensitive information (database credentials and SQL statements) by sniffing the network and deserializing the data.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Newrelic Ruby Agent | =3.2.0 | |
Newrelic Ruby Agent | =3.3.0 | |
Newrelic Ruby Agent | =3.3.1 | |
Newrelic Ruby Agent | =3.3.2 | |
Newrelic Ruby Agent | =3.3.2.1 | |
Newrelic Ruby Agent | =3.3.3 | |
Newrelic Ruby Agent | =3.3.4 | |
Newrelic Ruby Agent | =3.3.4.1 | |
Newrelic Ruby Agent | =3.3.5 | |
Newrelic Ruby Agent | =3.4.0 | |
Newrelic Ruby Agent | =3.4.0.1 | |
Newrelic Ruby Agent | =3.4.1 | |
Newrelic Ruby Agent | =3.4.2 | |
Newrelic Ruby Agent | =3.4.2.1 | |
Newrelic Ruby Agent | =3.5.0 | |
Newrelic Ruby Agent | =3.5.0.1 | |
Newrelic Ruby Agent | =3.5.1 | |
Newrelic Ruby Agent | =3.5.1.14 | |
Newrelic Ruby Agent | =3.5.2 | |
rubygems/newrelic_rpm | >=3.2.0<=3.5.3.23 | 3.5.3.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0284 is considered to be of high severity due to the potential exposure of sensitive data.
To fix CVE-2013-0284, upgrade the New Relic Ruby agent to version 3.5.3.24 or later.
CVE-2013-0284 affects New Relic Ruby agent versions 3.2.0 through 3.5.2.
CVE-2013-0284 can expose sensitive information such as database credentials and SQL statements.
There is no known workaround for CVE-2013-0284; upgrading to the fixed version is recommended.