Security Advisories (1)
CVE-2012-6141 (2014-06-04)

The App::Context module 0.01 through 0.968 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request to (1) App::Session::Cookie or (2) App::Session::HTMLHidden, which is not properly handled when it is deserialized.

NAME

App::Context::Cmd - context in which we are currently running

SYNOPSIS

# ... official way to get a Context object ...
use App;
$context = App->context();
$config = $context->config();   # get the configuration
$config->dispatch_events();     # dispatch events

# ... alternative way (used internally) ...
use App::Context::Cmd;
$context = App::Context::Cmd->new();

DESCRIPTION

A Context class models the environment (aka "context) in which the current process is running. For the App::Context::Cmd class, this models any of the web application runtime environments which employ the Cmd protocol and produce HTML pages as output. This includes CGI, mod_perl, FastCGI, etc. The difference between these environments is not in the Context but in the implementation of the Request and Response objects.

Methods:

user()

The user() method returns the username of the authenticated user. The special name, "guest", refers to the unauthenticated (anonymous) user.

* Signature: $username = $context->user();
* Param:  void
* Return: string
* Throws: <none>
* Since:  0.01

Sample Usage: 

$username = $context->user();