This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
[
{
"digest": {
"line_hashes": [
"167345421666657860427751115286855856640",
"98861883001289007481740951409216580623",
"263964561421323040037916083311620652220",
"222447488414536693641406874608061879292"
],
"threshold": 0.9
},
"target": {
"file": "modules/jooby-netty/src/main/java/io/jooby/internal/netty/NettyContext.java"
},
"signature_type": "Line",
"id": "CVE-2020-7622-b03c8724",
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4"
}
]