Security Advisories (1)
CVE-2012-6141 (2014-06-04)

The App::Context module 0.01 through 0.968 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request to (1) App::Session::Cookie or (2) App::Session::HTMLHidden, which is not properly handled when it is deserialized.

NAME

App::Context::Server - a runtime environment with a single master server and its subprocesses

SYNOPSIS

# ... official way to get a Context object ...
use App;
$context = App->context();
$config = $context->config();   # get the configuration
$config->dispatch_events();     # dispatch events

# ... alternative way (used internally) ...
use App::Context::Server;
$context = App::Context::Server->new();

wait_for_event()

* Signature: $self->wait_for_event($event_token)
* Param:     $event_token     string
* Return:    void
* Throws:    App::Exception
* Since:     0.01

Sample Usage: 

$self->wait_for_event($event_token);

The wait_for_event() method is called when an asynchronous event has been sent and no more processing can be completed before it is done.

user()

The user() method returns the username of the authenticated user. The special name, "guest", refers to the unauthenticated (anonymous) user.

* Signature: $username = $context->user();
* Param:  void
* Return: string
* Throws: <none>
* Since:  0.01

Sample Usage: 

$username = $context->user();