Security Advisories (13)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CVE-2010-4802 (2011-05-03)

Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2011-1841 (2011-03-10)

Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVE-2011-1589 (2011-04-05)

Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.

CVE-2010-4803 (2011-05-03)

Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.

CVE-2011-1841 (2011-05-03)

Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

NAME

Mojo::ByteStream - ByteStream

SYNOPSIS

use Mojo::ByteStream;

my $stream = Mojo::ByteStream->new('foobarbaz');

$stream->camelize;
$stream->decamelize;
$stream->b64_encode;
$stream->b64_decode;
$stream->encode('UTF-8');
$stream->decode('UTF-8');
$stream->html_escape;
$stream->html_unescape;
$stream->md5_sum;
$stream->qp_encode;
$stream->qp_decode;
$stream->quote;
$stream->unquote;
$stream->url_escape;
$stream->url_sanitize;
$stream->url_unescape;
$stream->xml_escape;
$stream->punycode_encode;
$stream->punycode_decode;

my $size = $stream->size;

my $stream2 = $stream->clone;
print $stream2->to_string;

# Chained
my $stream = Mojo::ByteStream->new('foo bar baz')->quote;
$stream = $stream->unquote->encode('UTF-8)->b64_encode;
print "$stream";

# Constructor alias
use Mojo::ByteStream 'b';

my $stream = b('foobarbaz')->html_escape;

# Buffering
my $stream = Mojo::ByteStream->new;
$stream->add_chunk('bar');
my $foo = $stream->remove(3);
my $bar = $stream->empty;

DESCRIPTION

Mojo::ByteStream provides portable text and bytestream manipulation functions.

Mojo::ByteStream implements the following attributes.

raw_size

my $size = $stream->raw_size;
$stream  = $stream->raw_size(23);

METHODS

Mojo::ByteStream inherits all methods from Mojo::Base and implements the following new ones.

new

my $stream = Mojo::ByteStream->new($string);

add_chunk

$stream = $stream->add_chunk('foo');

b64_decode

$stream = $stream->b64_decode;

b64_encode

$stream = $stream->b64_encode;

camelize

$stream = $stream->camelize;

clone

my $stream2 = $stream->clone;

contains

my $position = $stream->contains('something');

decamelize

$stream = $stream->decamelize;

decode

$stream = $stream->decode($encoding);

empty

my $chunk = $stream->empty;

encode

$stream = $stream->encode($encoding);

get_line

my $line = $stream->get_line;

html_escape

$stream = $stream->html_escape;

html_unescape

$stream = $stream->html_unescape;

md5_sum

$stream = $stream->md5_sum;

punycode_decode

$stream = $stream->punycode_decode;

punycode_encode

$stream = $stream->punycode_encode;

qp_decode

$stream = $stream->qp_decode;

qp_encode

$stream = $stream->qp_encode;

quote

$stream = $stream->quote;

remove

my $chunk = $stream->remove(4);
my $chunk = $stream->remove(4, 'abcd');

size

my $size = $stream->size;

to_string

my $string = $stream->to_string;

unquote

$stream = $stream->unquote;

url_escape

$stream = $stream->url_escape;
$stream = $stream->url_escape('A-Za-z0-9\-\.\_\~');

url_sanitize

$stream = $stream->url_sanitize;

url_unescape

$stream = $stream->url_unescape;

xml_escape

$stream = $stream->xml_escape;

SEE ALSO

Mojolicious, Mojolicious::Book, http://mojolicious.org.