New Relic .NET Agent before 6.3.123.0 adds SQL injection flaws to safe applications via vectors involving failure to escape quotes during use of the Slow Queries feature, as demonstrated by a mishandled quote in a VALUES clause of an INSERT statement, after bypassing a SET SHOWPLAN_ALL ON protection mechanism.
References
Link | Resource |
---|---|
https://blog.seanmcelroy.com/2017/05/26/sql-injection-with-new-relic-patched/ | Exploit Third Party Advisory |
https://blog.seanmcelroy.com/2017/05/26/sql-injection-with-new-relic-patched/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.seanmcelroy.com/2017/05/26/sql-injection-with-new-relic-patched/ - Exploit, Third Party Advisory |
Information
Published : 2017-06-13 18:29
Updated : 2024-11-21 03:35
NVD link : CVE-2017-9246
Mitre link : CVE-2017-9246
CVE.ORG link : CVE-2017-9246
JSON object : View
Products Affected
newrelic
- .net_agent
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')