CVE-2018-6806
07.02.2018, 05:29
Marked 2 through 2.5.11 allows remote attackers to read arbitrary files via a crafted HTML document that triggers a redirect to an x-marked://preview?text= URL. The value of the text parameter can include arbitrary JavaScript code, e.g., making XMLHttpRequest calls.Enginsight
Vendor | Product | Version |
---|---|---|
marked_2_project | marked_2 | 𝑥 ≤ 2.5.11 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References