Marked 2 through 2.5.11 allows remote attackers to read arbitrary files via a crafted HTML document that triggers a redirect to an x-marked://preview?text= URL. The value of the text parameter can include arbitrary JavaScript code, e.g., making XMLHttpRequest calls.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-02-07T05:00:00Z
Updated: 2024-09-16T20:13:16.223Z
Reserved: 2018-02-06T00:00:00Z
Link: CVE-2018-6806
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2018-02-07T05:29:00.370
Modified: 2019-09-11T18:09:04.097
Link: CVE-2018-6806
Redhat
No data.