CVE-2020-7622

This affects the package io.jooby:jooby-netty before 1.6.9, from 2.0.0 and before 2.2.1. The DefaultHttpHeaders is set to false which means it does not validates that the header isn't being abused for HTTP Response Splitting.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jooby:jooby:*:*:*:*:*:*:*:*
cpe:2.3:a:jooby:jooby:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
References () https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4 - Patch, Third Party Advisory () https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4 - Patch, Third Party Advisory
References () https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j - Exploit, Third Party Advisory () https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j - Exploit, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249 - Patch, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249 - Patch, Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 6.5

Information

Published : 2020-04-06 15:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7622

Mitre link : CVE-2020-7622

CVE.ORG link : CVE-2020-7622


JSON object : View

Products Affected

jooby

  • jooby