Description
This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
Remediation
References
https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4
https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j
https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249
Related Vulnerabilities
CVE-2022-0624 Vulnerability in maven package org.webjars.npm:parse-path
CVE-2018-20676 Vulnerability in maven package org.webjars.bowergithub.twbs:bootstrap
CVE-2023-26487 Vulnerability in npm package vega
CVE-2021-23359 Vulnerability in npm package port-killer
CVE-2022-31198 Vulnerability in npm package @openzeppelin/contracts