Security Advisories (4)
The path as passed in the fragment request data structure was used verbatim in the dispatcher and other locations. This possibly allowed requests to walk around ACLs by requesting '/some/safe/place/../../../dangerous' as a fragment.
The REST plugin would let you call any method on the model.
Allowed all actions on GET.
Jifty did not protect users against a class of remote data access vulnerability. If an attacker knew the structure of your local filesystem and you were using the "standalone" webserver in production, the attacker could gain read only access to local files.
NAME
Jifty::Web::Form::Field::Text - Renders as a small text field
classes
Output text fields with the class 'text'
Module Install Instructions
To install Jifty, copy and paste the appropriate command in to your terminal.
cpanm Jifty
perl -MCPAN -e shell
install Jifty
For more information on module installation, please visit the detailed CPAN module installation guide.