Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Rendertron
(Google)Repositories | https://github.com/GoogleChrome/rendertron |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-02-23 | CVE-2020-8902 | Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain. | Rendertron | 4.3 | ||
2018-12-17 | CVE-2017-18353 | Rendertron 1.0.0 includes an _ah/stop route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application. | Rendertron | 7.5 | ||
2018-12-17 | CVE-2017-18355 | Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files. | Rendertron | 7.5 | ||
2018-12-17 | CVE-2017-18354 | Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker. | Rendertron | 7.5 | ||
2018-12-17 | CVE-2017-18352 | Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs. | Rendertron | 6.1 |