HTTP Response Splitting Affecting io.jooby:jooby-netty package, versions [,1.6.9)[2.0.0, 2.2.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.78% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-IOJOOBY-564249
  • published2 Apr 2020
  • disclosed2 Apr 2020
  • creditJonathan Leitschuh

Introduced: 2 Apr 2020

CVE-2020-7622  (opens in a new tab)
CWE-113  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade io.jooby:jooby-netty to version 1.6.9, 2.2.1 or higher.

Overview

io.jooby:jooby-netty is a netty implementation in jooby

Affected versions of this package are vulnerable to HTTP Response Splitting. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.

CVSS Scores

version 3.1