All versions of Jooby before 2.2.1 are vulnerable to HTTP Response Splitting. The DefaultHttpHeaders is set to false which means it does not validates that the header isnβt being abused for HTTP Response Splitting.
https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j
https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7622