{"id":"UBUNTU-CVE-2015-2935","details":"MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to bypass the SVG filtering and obtain sensitive user information via a mixed case @import in a style element in an SVG file, as demonstrated by \"@imporT.\"","modified":"2025-07-16T07:32:48.967793Z","published":"2015-04-13T14:59:00Z","withdrawn":"2025-07-18T16:43:11Z","upstream":["CVE-2015-2935"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-2935"},{"type":"REPORT","url":"https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2015/04/01/1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-2935"}],"affected":[{"package":{"name":"mediawiki","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/mediawiki@1:1.27.4-3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.27.4-3"}]}],"versions":["1:1.27.3-1","1:1.27.4-1","1:1.27.4-2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"mediawiki","binary_version":"1:1.27.4-3"},{"binary_name":"mediawiki-classes","binary_version":"1:1.27.4-3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-2935.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}