Security Advisories (13)
Directory traversal on Windows
Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.
- https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952
- https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44
- http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes
- http://www.debian.org/security/2011/dsa-2239
Context sensitivity of method param could lead to parameter injection attacks.
Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.
Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Mojo::DOM did not correctly parse <script> tags.
Small sessions could be used as part of a brute-force attack to decode the session secret.
A bug in format detection can potentially be exploited for a DoS attack.
Mojo::UserAgent was not checking peer SSL certificates by default.
GET requests with embedded backslashes can be used to access local files on Windows hosts
Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.
NAME
MojoX::Controller - Controller Base Class
SYNOPSIS
use base 'MojoX::Controller';
DESCRIPTION
MojoX::Controller is an abstract controllers base class.
ATTRIBUTES
MojoX::Controller implements the following attributes.
app
my $app = $c->app;
$c = $c->app(MojoSubclass->new);
A reference back to the application that dispatched to this controller.
tx
my $tx = $c->tx;
The transaction that is currently being processed.
METHODS
MojoX::Controller inherits all methods from Mojo::Base and implements the following new ones.
req
my $req = $c->req;
Alias for $c-tx->req>. Usually refers to a Mojo::Message::Request object.
res
my $res = $c->res;
Alias for $c-tx->res>. Usually refers to a Mojo::Message::Response object.
stash
my $stash = $c->stash;
my $foo = $c->stash('foo');
$c = $c->stash({foo => 'bar'});
$c = $c->stash(foo => 'bar');
Non persistent data storage and exchange.
$c->stash->{foo} = 'bar';
my $foo = $c->stash->{foo};
delete $c->stash->{foo};
SEE ALSO
Module Install Instructions
To install Mojolicious, copy and paste the appropriate command in to your terminal.
cpanm Mojolicious
perl -MCPAN -e shell
install Mojolicious
For more information on module installation, please visit the detailed CPAN module installation guide.