Product:

Rendertron

(Google)
Repositories https://github.com/GoogleChrome/rendertron
#Vulnerabilities 5
Date Id Summary Products Score Patch Annotated
2021-02-23 CVE-2020-8902 Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain. Rendertron 4.3
2018-12-17 CVE-2017-18353 Rendertron 1.0.0 includes an _ah/stop route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application. Rendertron 7.5
2018-12-17 CVE-2017-18355 Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files. Rendertron 7.5
2018-12-17 CVE-2017-18354 Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker. Rendertron 7.5
2018-12-17 CVE-2017-18352 Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs. Rendertron 6.1