Description
This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
Remediation
References
https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4
https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j
https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249
Related Vulnerabilities
CVE-2022-31070 Vulnerability in npm package @ffdc/nestjs-proxy
CVE-2015-3253 Vulnerability in maven package org.codehaus.groovy:groovy-all
CVE-2021-41164 Vulnerability in maven package org.webjars.npm:ckeditor4
CVE-2020-14061 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2023-37895 Vulnerability in maven package org.apache.jackrabbit:jackrabbit-standalone