Description
Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
Remediation
References
https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0
Related Vulnerabilities
CVE-2018-1000185 Vulnerability in maven package org.jenkins-ci.plugins:github-branch-source
CVE-2020-8135 Vulnerability in npm package @uppy/companion
CVE-2021-39152 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2021-27738 Vulnerability in maven package org.apache.kylin:kylin-stream-coordinator
CVE-2018-17198 Vulnerability in maven package org.apache.roller:roller-webapp