Marked 2 through 2.5.11 allows remote attackers to read arbitrary files via a crafted HTML document that triggers a redirect to an x-marked://preview?text= URL. The value of the text parameter can include arbitrary JavaScript code, e.g., making XMLHttpRequest calls.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published: 2018-02-07T05:00:00Z
Updated: 2024-09-16T20:13:16.223Z
Reserved: 2018-02-06T00:00:00Z
Link: CVE-2018-6806

No data.

Status : Modified
Published: 2018-02-07T05:29:00.370
Modified: 2024-11-21T04:11:13.760
Link: CVE-2018-6806

No data.