{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T20:02:15.802","vulnerabilities":[{"cve":{"id":"CVE-2018-1000883","sourceIdentifier":"cve@mitre.org","published":"2018-12-20T21:29:00.290","lastModified":"2024-11-21T03:40:34.843","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Elixir Plug Plug version All contains a Header Injection vulnerability in Connection that can result in Given a cookie value, Headers can be added. This attack appear to be exploitable via Crafting a value to be sent as a cookie. This vulnerability appears to have been fixed in >= 1.3.5 or ~> 1.2.5 or ~> 1.1.9 or ~> 1.0.6."},{"lang":"es","value":"Elixir Plug Plug, en todas las versiones, contiene una vulnerabilidad de inyección de cabeceras que puede resultar en la adición de una cabecera, dado un valor de la cookie. El ataque parece ser explotable mediante la manipulación de un valor para que sea enviado como cookie. La vulnerabilidad parece haber sido solucionada a partir de la versión 1.3.5 o en las versiones 1.2.5, 1.1.9 o 1.0.6."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:plug_project:plug:*:*:*:*:*:*:*:*","versionStartExcluding":"1.0.6","versionEndIncluding":"1.1.9","matchCriteriaId":"62E71DD1-9113-48D5-97BE-7D2600E67579"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:plug_project:plug:*:*:*:*:*:*:*:*","versionStartExcluding":"1.1.9","versionEndIncluding":"1.2.5","matchCriteriaId":"8B0F9D90-1DA7-4BBA-BE51-CD598C45AD69"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:plug_project:plug:*:*:*:*:*:*:*:*","versionStartIncluding":"1.2.5","versionEndExcluding":"1.3.5","matchCriteriaId":"8A567A67-C7FF-4EF8-A332-C6793C3A29DD"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:plug_project:plug:*:*:*:*:*:*:*:*","versionStartIncluding":"1.3.5","matchCriteriaId":"BF83B69D-B326-4E42-B805-FBDBCAE74763"}]}]}],"references":[{"url":"https://github.com/dependabot/elixir-security-advisories/blob/master/packages/plug/2017-04-17.yml","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573","source":"cve@mitre.org","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/dependabot/elixir-security-advisories/blob/master/packages/plug/2017-04-17.yml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}