Security Advisories (13)
Directory traversal on Windows
Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.
- https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952
- https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44
- http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes
- http://www.debian.org/security/2011/dsa-2239
Context sensitivity of method param could lead to parameter injection attacks.
Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.
Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Mojo::DOM did not correctly parse <script> tags.
Small sessions could be used as part of a brute-force attack to decode the session secret.
A bug in format detection can potentially be exploited for a DoS attack.
Mojo::UserAgent was not checking peer SSL certificates by default.
GET requests with embedded backslashes can be used to access local files on Windows hosts
Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.
NAME
Mojo::Server::PSGI - PSGI Server
SYNOPSIS
# myapp.psgi
use Mojo::Server::PSGI;
my $psgi = Mojo::Server::PSGI->new(app_class => 'MyApp');
my $app = sub { $psgi->run(@_) };
DESCRIPTION
Mojo::Server::PSGI allows Mojo applications to run on all PSGI compatible servers.
METHODS
Mojo::Server::PSGI inherits all methods from Mojo::Server and implements the following new ones.
run
my $res = $psgi->run($env);
SEE ALSO
Module Install Instructions
To install Mojolicious, copy and paste the appropriate command in to your terminal.
cpanm Mojolicious
perl -MCPAN -e shell
install Mojolicious
For more information on module installation, please visit the detailed CPAN module installation guide.