Security Advisories (4)
CPANSA-Jifty-2011-01 (2011-03-17)

The path as passed in the fragment request data structure was used verbatim in the dispatcher and other locations. This possibly allowed requests to walk around ACLs by requesting '/some/safe/place/../../../dangerous' as a fragment.

CPANSA-Jifty-2009-01 (2009-04-09)

The REST plugin would let you call any method on the model.

CPANSA-Jifty-2008-01 (2009-04-08)

Allowed all actions on GET.

CPANSA-Jifty-2006-01 (2006-07-06)

Jifty did not protect users against a class of remote data access vulnerability. If an attacker knew the structure of your local filesystem and you were using the "standalone" webserver in production, the attacker could gain read only access to local files.

NAME

Jifty::Script::Model - Add a model class to your Jifty application

DESCRIPTION

This creates a skeleton of a new model class for your jifty application, complete with a skeleton of a test suite for it, as well.

API

options

There are only two possible options to this script:

--name NAME (required)

Name of the model class.

--force

By default, this will stop and warn you if any of the files it is going to write already exist. Passing the --force flag will make it overwrite the files.

run

Creates a skeleton file under lib/ApplicationClass/Model/Model, as well as a skeleton tests file.

DESCRIPTION

A basic test harness for the $model model.