Security Advisories (13)
Directory traversal on Windows
Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.
- https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952
- https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44
- http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes
- http://www.debian.org/security/2011/dsa-2239
Context sensitivity of method param could lead to parameter injection attacks.
Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.
Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Mojo::DOM did not correctly parse <script> tags.
Small sessions could be used as part of a brute-force attack to decode the session secret.
A bug in format detection can potentially be exploited for a DoS attack.
Mojo::UserAgent was not checking peer SSL certificates by default.
GET requests with embedded backslashes can be used to access local files on Windows hosts
Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.
NAME
Mojolicious::Plugin::AgentCondition - Agent Condition Plugin
SYNOPSIS
# Mojolicious
$self->plugin('agent_condition');
$self->routes->route('/:controller/:action')->over(agent => qr/Firefox/);
# Mojolicious::Lite
plugin 'agent_condition';
get '/' => (agent => qr/Firefox/) => sub {...};
DESCRIPTION
Mojolicous::Plugin::AgentCondition is a routes condition for user agent based routes.
METHODS
Mojolicious::Plugin::AgentCondition inherits all methods from Mojolicious::Plugin and implements the following new ones.
register
$plugin->register;
SEE ALSO
Module Install Instructions
To install Mojolicious, copy and paste the appropriate command in to your terminal.
cpanm Mojolicious
perl -MCPAN -e shell
install Mojolicious
For more information on module installation, please visit the detailed CPAN module installation guide.