Vulnerability Details CVE-2018-6806
Marked 2 through 2.5.11 allows remote attackers to read arbitrary files via a crafted HTML document that triggers a redirect to an x-marked://preview?text= URL. The value of the text parameter can include arbitrary JavaScript code, e.g., making XMLHttpRequest calls.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 69.1%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.3
Products affected by CVE-2018-6806
-
cpe:2.3:a:marked_2_project:marked_2:2.0
-
cpe:2.3:a:marked_2_project:marked_2:2.1
-
cpe:2.3:a:marked_2_project:marked_2:2.2
-
cpe:2.3:a:marked_2_project:marked_2:2.3
-
cpe:2.3:a:marked_2_project:marked_2:2.3.1
-
cpe:2.3:a:marked_2_project:marked_2:2.3.2
-
cpe:2.3:a:marked_2_project:marked_2:2.3.3
-
cpe:2.3:a:marked_2_project:marked_2:2.3.4
-
cpe:2.3:a:marked_2_project:marked_2:2.4.1
-
cpe:2.3:a:marked_2_project:marked_2:2.4.10
-
cpe:2.3:a:marked_2_project:marked_2:2.4.11
-
cpe:2.3:a:marked_2_project:marked_2:2.4.4
-
cpe:2.3:a:marked_2_project:marked_2:2.4.6
-
cpe:2.3:a:marked_2_project:marked_2:2.4.7
-
cpe:2.3:a:marked_2_project:marked_2:2.4.8
-
cpe:2.3:a:marked_2_project:marked_2:2.4.9
-
cpe:2.3:a:marked_2_project:marked_2:2.5.0
-
cpe:2.3:a:marked_2_project:marked_2:2.5.1
-
cpe:2.3:a:marked_2_project:marked_2:2.5.11
-
cpe:2.3:a:marked_2_project:marked_2:2.5.2
-
cpe:2.3:a:marked_2_project:marked_2:2.5.3
-
cpe:2.3:a:marked_2_project:marked_2:2.5.4
-
cpe:2.3:a:marked_2_project:marked_2:2.5.4.1
-
cpe:2.3:a:marked_2_project:marked_2:2.5.5
-
cpe:2.3:a:marked_2_project:marked_2:2.5.6
-
cpe:2.3:a:marked_2_project:marked_2:2.5.8
-
cpe:2.3:a:marked_2_project:marked_2:2.5.9