Security Advisories (12)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2011-1841 (2011-03-10)

Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

CVE-2011-1589 (2011-04-05)

Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.

CVE-2011-1841 (2011-05-03)

Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as an HMAC session cookie secret by default. These predictable default secrets can be exploited by an attacker to forge session cookies.  An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user’s session.

NAME

Mojo::URL - Uniform Resource Locator

SYNOPSIS

use Mojo::URL;

# Parse
my $url = Mojo::URL->new(
    'http://sri:foobar@kraih.com:3000/foo/bar?foo=bar#23'
);
print $url->scheme;
print $url->userinfo;
print $url->host;
print $url->port;
print $url->path;
print $url->query;
print $url->fragment;

# Build
my $url = Mojo::URL->new;
$url->scheme('http');
$url->userinfo('sri:foobar');
$url->host('kraih.com');
$url->port(3000);
$url->path('/foo/bar');
$url->path('baz');
$url->query->param(foo => 'bar');
$url->fragment(23);
print "$url";

DESCRIPTION

Mojo::URL implements a subset of RFC 3986 and RFC 3987 for Uniform Resource Locators with support for IDNA and IRIs.

ATTRIBUTES

Mojo::URL implements the following attributes.

authority

my $authority = $url->autority;
$url          = $url->authority('root:pass%3Bw0rd@localhost:8080');

Authority part of this URL.

base

my $base = $url->base;
$url     = $url->base(Mojo::URL->new);

Base of this URL.

fragment

my $fragment = $url->fragment;
$url         = $url->fragment('foo');

Fragment part of this URL.

host

my $host = $url->host;
$url     = $url->host('127.0.0.1');

Host part of this URL.

port

my $port = $url->port;
$url     = $url->port(8080);

Port part of this URL.

scheme

my $scheme = $url->scheme;
$url       = $url->scheme('http');

Scheme part of this URL.

userinfo

my $userinfo = $url->userinfo;
$url         = $url->userinfo('root:pass%3Bw0rd');

Userinfo part of this URL.

METHODS

Mojo::URL inherits all methods from Mojo::Base and implements the following new ones.

new

my $url = Mojo::URL->new;
my $url = Mojo::URL->new('http://127.0.0.1:3000/foo?f=b&baz=2#foo');

Construct a new Mojo::URL object.

clone

my $url2 = $url->clone;

Clone this URL.

ihost

my $ihost = $url->ihost;
$url      = $url->ihost('xn--bcher-kva.ch');

Host part of this URL in punycode format.

is_abs

my $is_abs = $url->is_abs;

Check if URL is absolute.

is_ipv4

my $is_ipv4 = $url->is_ipv4;

Check if host is an IPv4 address. Note that this method is EXPERIMENTAL and might change without warning!

is_ipv6

my $is_ipv6 = $url->is_ipv6;

Check if host is an IPv6 address. Note that this method is EXPERIMENTAL and might change without warning!

parse

$url = $url->parse('http://127.0.0.1:3000/foo/bar?fo=o&baz=23#foo');

Parse URL.

path

my $path = $url->path;
$url     = $url->path('/foo/bar');
$url     = $url->path('foo/bar');
$url     = $url->path(Mojo::Path->new);

Path part of this URL, relative paths will be appended to the existing path, defaults to a Mojo::Path object.

query

my $query = $url->query;
$url      = $url->query(replace => 'with');
$url      = $url->query([replace => 'with']);
$url      = $url->query({append => 'to'});
$url      = $url->query(Mojo::Parameters->new);

Query part of this URL, defaults to a Mojo::Parameters object.

to_abs

my $abs = $url->to_abs;
my $abs = $url->to_abs(Mojo::URL->new('http://kraih.com/foo'));

Turn relative URL into an absolute one.

to_rel

my $rel = $url->to_rel;
my $rel = $url->to_rel(Mojo::URL->new('http://kraih.com/foo'));

Turn absolute URL into a relative one.

to_string

my $string = $url->to_string;

Turn URL into a string.

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicious.org.