Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0729 | Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain. |
Github GHSA |
GHSA-xr9h-9m79-x29g | SSRF in Rendertron |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-04T10:12:11.061Z
Reserved: 2020-02-12T00:00:00
Link: CVE-2020-8902
No data.
Status : Modified
Published: 2021-02-23T12:15:12.600
Modified: 2024-11-21T05:39:39.457
Link: CVE-2020-8902
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA