diff --git a/java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.java b/java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.java
new file mode 100644
index 00000000000..499afdf0f3a
--- /dev/null
+++ b/java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.java
@@ -0,0 +1,9 @@
+import io.netty.handler.codec.http.DefaultHttpHeaders;
+
+public class ResponseSplitting {
+ // BAD: Disables the internal response splitting verification
+ private final DefaultHttpHeaders badHeaders = new DefaultHttpHeaders(false);
+
+ // GOOD: Verifies headers passed don't contain CLRF characters
+ private final DefaultHttpHeaders badHeaders = new DefaultHttpHeaders();
+}
diff --git a/java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.qhelp b/java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.qhelp
new file mode 100644
index 00000000000..17afa6275fc
--- /dev/null
+++ b/java/ql/src/Security/CWE/CWE-113/NettyResponseSplitting.qhelp
@@ -0,0 +1,5 @@
+
+
The following example shows the use of the library 'netty' with HTTP response-splitting verification configurations. +The second way will verify the parameters before using them to build the HTTP response.
+ +