This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
{ "vanir_signatures": [ { "id": "CVE-2020-7622-b03c8724", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "167345421666657860427751115286855856640", "98861883001289007481740951409216580623", "263964561421323040037916083311620652220", "222447488414536693641406874608061879292" ] }, "source": "https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4", "target": { "file": "modules/jooby-netty/src/main/java/io/jooby/internal/netty/NettyContext.java" }, "deprecated": false, "signature_version": "v1" } ] }