Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0729 Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
Github GHSA Github GHSA GHSA-xr9h-9m79-x29g SSRF in Rendertron
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2024-08-04T10:12:11.061Z

Reserved: 2020-02-12T00:00:00

Link: CVE-2020-8902

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-23T12:15:12.600

Modified: 2024-11-21T05:39:39.457

Link: CVE-2020-8902

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.