Description
Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
Remediation
References
https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0
Related Vulnerabilities
CVE-2023-48711 Vulnerability in npm package google-translate-api-browser
CVE-2022-4725 Vulnerability in maven package com.amazonaws:aws-android-sdk-core
CVE-2023-48240 Vulnerability in maven package org.xwiki.platform:xwiki-platform-diff-xml
CVE-2019-0227 Vulnerability in maven package org.apache.axis:axis-rt-core
CVE-2023-43795 Vulnerability in maven package org.geoserver.extension:gs-wps-core