Marked 2 through 2.5.11 allows remote attackers to read arbitrary files via a crafted HTML document that triggers a redirect to an x-marked://preview?text URL. The value of the text parameter can include arbitrary JavaScript code, e.g., making XMLHttpRequest calls.
Publication date: Wed, 11 Sep 2019 23:09:00 +0000