Security Advisories (13)
Directory traversal on Windows
Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.
- https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952
- https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44
- http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes
- http://www.debian.org/security/2011/dsa-2239
Context sensitivity of method param could lead to parameter injection attacks.
Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Mojo::DOM did not correctly parse <script> tags.
Small sessions could be used as part of a brute-force attack to decode the session secret.
A bug in format detection can potentially be exploited for a DoS attack.
Mojo::UserAgent was not checking peer SSL certificates by default.
GET requests with embedded backslashes can be used to access local files on Windows hosts
Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.
Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as an HMAC session cookie secret by default. These predictable default secrets can be exploited by an attacker to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.
- https://github.com/mojolicious/mojo/pull/1791
- https://github.com/mojolicious/mojo/pull/2200
- https://www.synacktiv.com/publications/baking-mojolicious-cookies
- https://medium.com/securing/baking-mojolicious-cookies-revisited-a-case-study-of-solving-security-problems-through-security-by-13da7c225802
- https://metacpan.org/release/SRI/Mojolicious-9.39/source/lib/Mojolicious.pm#L51
- https://github.com/hashcat/hashcat/pull/4090
- https://lists.debian.org/debian-perl/2025/05/msg00016.html
- https://lists.debian.org/debian-perl/2025/05/msg00017.html
- https://lists.debian.org/debian-perl/2025/05/msg00018.html
- https://github.com/mojolicious/mojo/pull/2252
- https://docs.mojolicious.org/Mojolicious/Guides/FAQ#What-does-Your-secret-passphrase-needs-to-be-changed-mean
NAME
Mojo::Date - HTTP 1.1 Date Container
SYNOPSIS
use Mojo::Date;
my $date = Mojo::Date->new(784111777);
my $http_date = $date->to_string;
$date->parse('Sun, 06 Nov 1994 08:49:37 GMT');
my $epoch = $date->epoch;
DESCRIPTION
Mojo::Date implements HTTP 1.1 date and time functions according to RFC 2616.
Sun, 06 Nov 1994 08:49:37 GMT ; RFC 822, updated by RFC 1123
Sunday, 06-Nov-94 08:49:37 GMT ; RFC 850, obsoleted by RFC 1036
Sun Nov 6 08:49:37 1994 ; ANSI C's asctime() format
ATTRIBUTES
Mojo::Date implements the following attributes.
epoch
my $epoch = $date->epoch;
$date = $date->epoch(784111777);
Epoch seconds.
METHODS
Mojo::Date inherits all methods from Mojo::Base and implements the following new ones.
new
my $date = Mojo::Date->new;
my $date = Mojo::Date->new($string);
Construct a new Mojo::Date object.
parse
$date = $date->parse('Sun Nov 6 08:49:37 1994');
Parsable formats include:
- Epoch format (784111777)
- RFC 822/1123 (Sun, 06 Nov 1994 08:49:37 GMT)
- RFC 850/1036 (Sunday, 06-Nov-94 08:49:37 GMT)
- ANSI C asctime() (Sun Nov 6 08:49:37 1994)
to_string
my $string = $date->to_string;
Render date suitable for HTTP 1.1 messages.
SEE ALSO
Module Install Instructions
To install Mojolicious, copy and paste the appropriate command in to your terminal.
cpanm Mojolicious
perl -MCPAN -e shell
install Mojolicious
For more information on module installation, please visit the detailed CPAN module installation guide.