Security Advisories (14)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CVE-2010-4802 (2011-05-03)

Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2011-1841 (2011-03-10)

Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVE-2011-1589 (2011-04-05)

Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.

CVE-2010-4803 (2011-05-03)

Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.

CVE-2011-1841 (2011-05-03)

Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user's session.

NAME

Mojo::Asset::File - File Asset

SYNOPSIS

use Mojo::Asset::File;

my $asset = Mojo::Asset::File->new;
$asset->add_chunk('foo bar baz');
print $asset->slurp;

my $asset = Mojo::Asset::File->new(path => '/foo/bar/baz.txt');
print $asset->slurp;

DESCRIPTION

Mojo::Asset::File is a container for file assets.

ATTRIBUTES

Mojo::Asset::File implements the following attributes.

cleanup

my $cleanup = $asset->cleanup;
$asset      = $asset->cleanup(1);

Delete file automatically once it's not used anymore.

end_range

my $end = $asset->end_range;
$asset  = $asset->end_range(8);

Pretend file ends earlier.

handle

my $handle = $asset->handle;
$asset     = $asset->handle(IO::File->new);

Actual file handle.

path

my $path = $asset->path;
$asset   = $asset->path('/foo/bar/baz.txt');

Actual file path.

start_range

my $start = $asset->start_range;
$asset    = $asset->start_range(0);

Pretend file starts later.

tmpdir

my $tmpdir = $asset->tmpdir;
$asset     = $asset->tmpdir('/tmp');

Temporary directory.

METHODS

Mojo::Asset::File inherits all methods from Mojo::Asset and implements the following new ones.

add_chunk

$asset = $asset->add_chunk('foo bar baz');

Add chunk of data to asset.

contains

my $position = $asset->contains('bar');

Check if asset contains a specific string.

get_chunk

my $chunk = $asset->get_chunk($offset);

Get chunk of data starting from a specific position.

move_to

$asset = $asset->move_to('/foo/bar/baz.txt');

Move asset data into a specific file.

size

my $size = $asset->size;

Size of asset data in bytes.

slurp

my $string = $file->slurp;

Read all asset data at once.

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicious.org.