Security Advisories (4)
CPANSA-Jifty-2011-01 (2011-03-17)

The path as passed in the fragment request data structure was used verbatim in the dispatcher and other locations. This possibly allowed requests to walk around ACLs by requesting '/some/safe/place/../../../dangerous' as a fragment.

CPANSA-Jifty-2009-01 (2009-04-09)

The REST plugin would let you call any method on the model.

CPANSA-Jifty-2008-01 (2009-04-08)

Allowed all actions on GET.

CPANSA-Jifty-2006-01 (2006-07-06)

Jifty did not protect users against a class of remote data access vulnerability. If an attacker knew the structure of your local filesystem and you were using the "standalone" webserver in production, the attacker could gain read only access to local files.

NAME

Jifty::Script::Po - Extract translatable strings from your application

DESCRIPTION

Extracts message catalogs for your Jifty app. When run, Jifty will update all existing message catalogs, as well as create a new one if you specify a --language flag

options

This script only takes one option, --language, which is optional; it is the name of a message catalog to create.

run

Runs the "update_catalogs" method.

_check_mime_type FILENAME

This routine returns a mimetype for the file FILENAME.

update_catalogs

Extracts localizable messages from all files in your application, finds all your message catalogs and updates them with new and changed messages.

update_catalog FILENAME

Reads FILENAME, a message catalog and integrates new or changed translations.

extract_messages

Find all translatable messages in your application, using Locale::Maketext::Extract.