Description
This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
Remediation
References
https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4
https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j
https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249
Related Vulnerabilities
CVE-2022-39396 Vulnerability in npm package parse-server
CVE-2022-25912 Vulnerability in maven package org.webjars.npm:simple-git
CVE-2021-4178 Vulnerability in maven package io.fabric8:kubernetes-client
CVE-2016-10735 Vulnerability in maven package org.webjars.bowergithub.jasny:bootstrap
CVE-2013-2254 Vulnerability in maven package org.apache.sling:org.apache.sling.servlets.post