Marked 2 through 2.5.11 allows remote attackers to read arbitrary files via a crafted HTML document that triggers a redirect to an x-marked://preview?text= URL. The value of the text parameter can include arbitrary JavaScript code, e.g., making XMLHttpRequest calls.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.lynxsecurity.io/releases/Local%20File%20Disclosure%20in%20Marked2.pdf | third party advisory exploit |
http://support.markedapp.com/discussions/questions/9089-reporting-a-vulnerability | third party advisory issue tracking |