This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0381 | This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting. |
Github GHSA |
GHSA-gv3v-92v6-m48j | Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T17:03:41.455Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7622
No data.
Status : Modified
Published: 2020-04-06T15:15:12.770
Modified: 2024-11-21T05:37:29.360
Link: CVE-2020-7622
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA