CVE-2020-8902

Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:rendertron:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0 - () https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0 -
CVSS v2 : 4.0
v3 : 4.3
v2 : 4.0
v3 : 3.5

07 Nov 2023, 03:26

Type Values Removed Values Added
References (CONFIRM) https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0 - Release Notes, Third Party Advisory () https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0 -

Information

Published : 2021-02-23 12:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8902

Mitre link : CVE-2020-8902

CVE.ORG link : CVE-2020-8902


JSON object : View

Products Affected

google

  • rendertron
CWE
CWE-284

Improper Access Control

CWE-918

Server-Side Request Forgery (SSRF)