Security Advisories (10)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CVE-2020-36829 (2020-11-10)

Mojo::Util secure_compare can leak the string length. By immediately returning when the two strings are not the same length, the function allows an attacker to guess the length of the secret string using timing attacks.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user's session.

NAME

Mojo::Message::Request - HTTP 1.1 request container

SYNOPSIS

use Mojo::Message::Request;

# Parse
my $req = Mojo::Message::Request->new;
$req->parse("GET /foo HTTP/1.0\x0a\x0d");
$req->parse("Content-Length: 12\x0a\x0d\x0a\x0d");
$req->parse("Content-Type: text/plain\x0a\x0d\x0a\x0d");
$req->parse('Hello World!');
say $req->body;

# Build
my $req = Mojo::Message::Request->new;
$req->url->parse('http://127.0.0.1/foo/bar');
$req->method('GET');
say $req->to_string;

DESCRIPTION

Mojo::Message::Request is a container for HTTP 1.1 requests as described in RFC 2616.

EVENTS

Mojo::Message::Request inherits all events from Mojo::Message.

ATTRIBUTES

Mojo::Message::Request inherits all attributes from Mojo::Message and implements the following new ones.

env

my $env = $req->env;
$req    = $req->env({});

Direct access to the environment hash if available.

method

my $method = $req->method;
$req       = $req->method('GET');

HTTP request method.

url

my $url = $req->url;
$req    = $req->url(Mojo::URL->new);

HTTP request URL, defaults to a Mojo::URL object.

METHODS

Mojo::Message::Request inherits all methods from Mojo::Message and implements the following new ones.

clone

my $clone = $req->clone;

Clone request if possible. Note that this method is EXPERIMENTAL and might change without warning!

cookies

my $cookies = $req->cookies;
$req        = $req->cookies(Mojo::Cookie::Request->new);
$req        = $req->cookies({name => 'foo', value => 'bar'});

Access request cookies, usually Mojo::Cookie::Request objects.

fix_headers

$req = $req->fix_headers;

Make sure message has all required headers for the current HTTP version.

is_secure

my $success = $req->is_secure;

Check if connection is secure.

is_xhr

my $success = $req->is_xhr;

Check X-Requested-With header for XMLHttpRequest value.

param

my $param = $req->param('foo');

Access GET and POST parameters.

params

my $params = $req->params;

All GET and POST parameters, usually a Mojo::Parameters object.

parse

$req = $req->parse('GET /foo/bar HTTP/1.1');
$req = $req->parse(REQUEST_METHOD => 'GET');
$req = $req->parse({REQUEST_METHOD => 'GET'});

Parse HTTP request chunks or environment hash.

proxy

my $proxy = $req->proxy;
$req      = $req->proxy('http://foo:bar@127.0.0.1:3000');
$req      = $req->proxy(Mojo::URL->new('http://127.0.0.1:3000'));

Proxy URL for message.

query_params

my $params = $req->query_params;

All GET parameters, usually a Mojo::Parameters object.

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicio.us.