Description
This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
Remediation
References
https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4
https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j
https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249
Related Vulnerabilities
CVE-2022-45397 Vulnerability in maven package org.jenkins-ci.plugins:osf-builder-suite-xml-linter
CVE-2021-27905 Vulnerability in maven package org.apache.solr:solr-core
CVE-2020-28052 Vulnerability in maven package org.bouncycastle:bcprov-jdk15on
CVE-2021-23353 Vulnerability in npm package jspdf
CVE-2019-20444 Vulnerability in maven package io.netty:netty-all