Security Advisories (2)
CVE-2006-1279 (2006-03-19)

CGI::Session 4.03-1 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by (1) Driver::File, (2) Driver::db_file, and possibly (3) Driver::sqlite.

CPANSA-CGI-Session-2006-01 (2006-04-06)

possible SQL injection attack

NAME

CGI::Session::Driver::db_file - CGI::Session driver for BerkeleyDB using DB_File

SYNOPSIS

$s = new CGI::Session("driver:db_file", $sid);
$s = new CGI::Session("driver:db_file", $sid, {FileName=>'/tmp/cgisessions.db'});

DESCRIPTION

db_file stores session data in BerkelyDB file using DB_File - Perl module. All sessions will be stored in a single file, specified in FileName driver argument as in the above example. If FileName isn't given, defaults to /tmp/cgisess.db, or its equivalent on a non-UNIX system.

If directory hierarchy leading to the file does not exist, will be created for you.

LICENSING

For support and licensing information see CGI::Session