Security Advisories (10)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CVE-2020-36829 (2020-11-10)

Mojo::Util secure_compare can leak the string length. By immediately returning when the two strings are not the same length, the function allows an attacker to guess the length of the secret string using timing attacks.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user's session.

NAME

Mojo::IOLoop::Resolver - IOLoop DNS stub resolver

SYNOPSIS

use Mojo::IOLoop::Resolver;

# Lookup address
my $resolver = Mojo::IOLoop::Resolver->new;
$resolver->lookup('mojolicio.us' => sub {
  my ($resolver, $address) = @_;
  ...
});

# Resolve "MX" records
$resolver->resolve('mojolicio.us', 'MX', sub {
  my ($resolver, $records) = @_;
  ...
});

DESCRIPTION

Mojo::IOLoop::Resolver is a minimalistic non-blocking I/O DNS stub resolver used by Mojo:IOLoop. Note that this module is EXPERIMENTAL and might change without warning!

ATTRIBUTES

Mojo::IOLoop::Resolver implements the following attributes.

ioloop

my $ioloop = $resolver->ioloop;
$resolver  = $resolver->ioloop(Mojo::IOLoop->new);

Loop object to use for I/O operations, defaults to the global Mojo::IOLoop singleton.

timeout

my $timeout = $resolver->timeout;
$resolver   = $resolver->timeout(5);

Maximum time in seconds a DNS lookup can take, defaults to 3.

METHODS

Mojo::IOLoop::Resolver inherits all methods from Mojo::Base and implements the following new ones.

build

my $req = $resolver->build($id, 'A', 'mojolicio.us');

Build DNS request.

is_ipv4

my $success = $resolver->is_ipv4('127.0.0.1');

Check if value is a valid IPv4 address.

is_ipv6

my $success = $resolver->is_ipv6('::1');

Check if value is a valid IPv6 address.

lookup

$resolver->lookup('mojolicio.us' => sub {...});

Lookup IPv4 or IPv6 address for domain.

$resolver->lookup('mojolicio.us' => sub {
  my ($loop, $address) = @_;
  say "Address: $address";
  Mojo::IOLoop->stop;
});
Mojo::IOLoop->start;

parse

my ($id, $answers) = $resolver->parse($res);

Parse DNS reponse.

resolve

$resolver->resolve('mojolicio.us', 'A', sub {...});

Resolve domain into A, AAAA, CNAME, MX, NS, PTR or TXT records, * will query for all at once. Since this is a "stub resolver" it depends on a recursive name server for DNS resolution.

servers

my @all     = $resolver->servers;
my $current = $resolver->servers;
$resolver->servers('8.8.8.8', '8.8.4.4');

IP addresses of DNS servers used for lookups, defaults to the value of the MOJO_DNS_SERVER environment variable, auto detection, 8.8.8.8 or 8.8.4.4.

DEBUGGING

You can set the MOJO_RESOLVER_DEBUG environment variable to get some advanced diagnostics information printed to STDERR.

MOJO_RESOLVER_DEBUG=1

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicio.us.