Security Advisories (13)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CVE-2010-4802 (2011-05-03)

Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2011-1841 (2011-03-10)

Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVE-2011-1589 (2011-04-05)

Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.

CVE-2011-1841 (2011-05-03)

Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as an HMAC session cookie secret by default. These predictable default secrets can be exploited by an attacker to forge session cookies.  An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.

NAME

Mojo::Server::Daemon - Async IO HTTP 1.1 And WebSocket Server

SYNOPSIS

use Mojo::Server::Daemon;

my $daemon = Mojo::Server::Daemon->new;
$daemon->listen('http://*:8080');
$daemon->run;

DESCRIPTION

Mojo::Server::Daemon is a full featured async io HTTP 1.1 and WebSocket server with IPv6, TLS, Bonjour, epoll, kqueue, hot deployment and UNIX domain socket sharing support.

Optional modules IO::KQueue, IO::Epoll, IO::Socket::INET6, IO::Socket::SSL and Net::Rendezvous::Publish are supported transparently and used if installed.

ATTRIBUTES

Mojo::Server::Daemon inherits all attributes from Mojo::Server and implements the following new ones.

group

my $group = $daemon->group;
$daemon   = $daemon->group('users');

Group for server process.

ioloop

my $loop = $daemon->ioloop;
$daemon  = $daemon->ioloop(Mojo::IOLoop->new);

Event loop for server IO, defaults to the global Mojo::IOLoop singleton.

keep_alive_timeout

my $keep_alive_timeout = $daemon->keep_alive_timeout;
$daemon                = $daemon->keep_alive_timeout(15);

Timeout for keep alive connections in seconds, defaults to 15.

listen

my $listen = $daemon->listen;
$daemon    = $daemon->listen('https://localhost:3000,file:///my.sock');

Ports and files to listen on, defaults to http://*:3000.

listen_queue_size

my $listen_queue_size = $daemon->listen_queue_zise;
$daemon               = $daemon->listen_queue_zise(128);

Listen queue size, defaults to SOMAXCONN.

max_clients

my $max_clients = $daemon->max_clients;
$daemon         = $daemon->max_clients(1000);

Maximum number of parallel client connections, defaults to 1000.

max_keep_alive_requests

my $max_keep_alive_requests = $daemon->max_keep_alive_requests;
$daemon                     = $daemon->max_keep_alive_requests(100);

Maximum number of keep alive requests per connection, defaults to 100.

max_requests

my $max_requests = $daemon->max_requests;
$daemon          = $daemon->max_requests(1);

Maximum number of requests the daemon is allowed to handle, not used by default.

pid_file

my $pid_file = $daemon->pid_file;
$daemon      = $daemon->pid_file('/tmp/mojo_daemon.pid');

Path to process id file, defaults to a random temporary file.

silent

my $silent = $daemon->silent;
$daemon    = $daemon->silent(1);

Disable console messages.

user

my $user = $daemon->user;
$daemon  = $daemon->user('web');

User for the server process.

websocket_timeout

my $websocket_timeout = $server->websocket_timeout;
$server               = $server->websocket_timeout(300);

Timeout in seconds for WebSockets to be idle, defaults to 300.

METHODS

Mojo::Server::Daemon inherits all methods from Mojo::Server and implements the following new ones.

prepare_ioloop

$daemon->prepare_ioloop;

Prepare event loop.

prepare_pid_file

$daemon->prepare_pid_file;

Prepare process id file.

run

$daemon->run;

Start server.

setuidgid

$daemon->setuidgid;

Set user and group for process.

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicious.org.