This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2020-0381 | This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting. | 
  Github GHSA | 
                GHSA-gv3v-92v6-m48j | Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting) | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T17:03:41.455Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7622
No data.
Status : Modified
Published: 2020-04-06T15:15:12.770
Modified: 2024-11-21T05:37:29.360
Link: CVE-2020-7622
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD
 Github GHSA