Security Advisories (13)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CVE-2010-4802 (2011-05-03)

Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2011-1841 (2011-03-10)

Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVE-2011-1589 (2011-04-05)

Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.

CVE-2011-1841 (2011-05-03)

Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user's session.

NAME

Mojo::ByteStream - ByteStream

SYNOPSIS

use Mojo::ByteStream;

my $stream = Mojo::ByteStream->new('foobarbaz');

$stream->camelize;
$stream->decamelize;
$stream->b64_encode;
$stream->b64_decode;
$stream->encode('UTF-8');
$stream->decode('UTF-8');
$stream->hmac_md5_sum('secret');
$stream->hmac_sha1_sum('secret');
$stream->html_escape;
$stream->html_unescape;
$stream->md5_bytes;
$stream->md5_sum;
$stream->qp_encode;
$stream->qp_decode;
$stream->quote;
$stream->sha1_bytes;
$stream->sha1_sum;
$stream->trim;
$stream->unquote;
$stream->url_escape;
$stream->url_sanitize;
$stream->url_unescape;
$stream->xml_escape;
$stream->punycode_encode;
$stream->punycode_decode;

my $size = $stream->size;

my $stream2 = $stream->clone;
print $stream2->to_string;
$stream2->say;

# Chained
my $stream = Mojo::ByteStream->new('foo bar baz')->quote;
$stream = $stream->unquote->encode('UTF-8)->b64_encode;
print "$stream";

# Alternative constructor
use Mojo::ByteStream 'b';
my $stream = b('foobarbaz')->html_escape;

# Buffering
my $stream = Mojo::ByteStream->new;
$stream->add_chunk('bar');
my $foo = $stream->remove(3);
my $bar = $stream->empty;

DESCRIPTION

Mojo::ByteStream provides portable text and bytestream manipulation functions.

ATTRIBUTES

Mojo::ByteStream implements the following attributes.

raw_size

my $size = $stream->raw_size;
$stream  = $stream->raw_size(23);

Raw bytestream size in bytes.

METHODS

Mojo::ByteStream inherits all methods from Mojo::Base and implements the following new ones.

new

my $stream = Mojo::ByteStream->new($string);

Construct a new Mojo::ByteStream object.

add_chunk

$stream = $stream->add_chunk('foo');

Add chunk of data to bytestream.

b64_decode

$stream = $stream->b64_decode;

Base 64 decode bytestream.

b64_encode

$stream = $stream->b64_encode;
$stream = $stream->b64_encode('');

Base 64 encode bytestream.

camelize

$stream = $stream->camelize;

Camelize bytestream.

foo_bar -> FooBar

clone

my $stream2 = $stream->clone;

Clone bytestream.

contains

my $position = $stream->contains('something');

Check if bytestream contains a specific string.

decamelize

$stream = $stream->decamelize;

Decamelize bytestream.

FooBar -> foo_bar

decode

$stream = $stream->decode($encoding);

Decode bytestream.

$stream->decode('UTF-8')->to_string;

empty

my $chunk = $stream->empty;

Empty bytestream.

encode

$stream = $stream->encode($encoding);

Encode bytestream.

$stream->encode('UTF-8')->to_string;

get_line

my $line = $stream->get_line;

Extract a whole line from start of bytestream. Lines are expected to end with 0x0d 0x0a or 0x0a.

hmac_md5_sum

$stream = $stream->hmac_md5_sum($secret);

Turn bytestream into HMAC-MD5 checksum of old content.

hmac_sha1_sum

$stream = $stream->hmac_sha1_sum($secret);

Turn bytestream into HMAC-SHA1 checksum of old content. Note that Perl 5.10 or Digest::SHA are required for SHA1 support.

html_escape

$stream = $stream->html_escape;

HTML escape bytestream.

html_unescape

$stream = $stream->html_unescape;

HTML unescape bytestream.

md5_bytes

$stream = $stream->md5_bytes;

Turn bytestream into binary MD5 checksum of old content.

md5_sum

$stream = $stream->md5_sum;

Turn bytestream into MD5 checksum of old content.

punycode_decode

$stream = $stream->punycode_decode;

Punycode decode bytestream, as described in RFC 3492.

punycode_encode

$stream = $stream->punycode_encode;

Punycode encode bytestream, as described in RFC 3492.

qp_decode

$stream = $stream->qp_decode;

Quoted Printable decode bytestream.

qp_encode

$stream = $stream->qp_encode;

Quoted Printable encode bytestream.

quote

$stream = $stream->quote;

Quote bytestream.

remove

my $chunk = $stream->remove(4);
my $chunk = $stream->remove(4, 'abcd');

Remove a specific number of bytes from bytestream.

say

$stream->say;
$stream->say(*STDERR);

Print bytestream to handle or STDOUT and append a newline.

sha1_bytes

$stream = $stream->sha1_bytes;

Turn bytestream into binary SHA1 checksum of old content. Note that Perl 5.10 or Digest::SHA are required for SHA1 support.

sha1_sum

$stream = $stream->sha1_sum;

Turn bytestream into SHA1 checksum of old content. Note that Perl 5.10 or Digest::SHA are required for SHA1 support.

size

my $size = $stream->size;

Size of bytestream.

to_string

my $string = $stream->to_string;

Stringify bytestream.

trim

$stream = $stream->trim;

Trim whitespace characters from both ends of bytestream.

unquote

$stream = $stream->unquote;

Unquote bytestream.

url_escape

$stream = $stream->url_escape;
$stream = $stream->url_escape('A-Za-z0-9\-\.\_\~');

URL escape bytestream.

url_sanitize

$stream = $stream->url_sanitize;

URL sanitize bytestream.

url_unescape

$stream = $stream->url_unescape;

URL unescape bytestream.

xml_escape

$stream = $stream->xml_escape;

XML escape bytestream, this is a much faster version of html_escape escaping only the characters &, <, >, " and '.

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicious.org.