Security Advisories (10)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CVE-2020-36829 (2020-11-10)

Mojo::Util secure_compare can leak the string length. By immediately returning when the two strings are not the same length, the function allows an attacker to guess the length of the secret string using timing attacks.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user's session.

NAME

Mojolicious::Sessions - Signed cookie based sessions

SYNOPSIS

use Mojolicious::Sessions;

my $sessions = Mojolicious::Sessions->new;

DESCRIPTION

Mojolicious::Sessions is a very simple signed cookie based session implementation. All data gets serialized with Mojo::JSON and stored on the client-side, but is protected from unwanted changes with a signature.

ATTRIBUTES

Mojolicious::Sessions implements the following attributes.

my $domain = $session->cookie_domain;
$session   = $session->cookie_domain('.example.com');

Domain for session cookie, not defined by default.

my $name = $session->cookie_name;
$session = $session->cookie_name('session');

Name of the signed cookie used to store session data, defaults to mojolicious.

my $path = $session->cookie_path;
$session = $session->cookie_path('/foo');

Path for session cookie, defaults to /.

default_expiration

my $time = $session->default_expiration;
$session = $session->default_expiration(3600);

Time for the session to expire in seconds from now, defaults to 3600. The expiration timeout gets refreshed for every request. For more control you can also use the expires session value to set the expiration date to a specific time in epoch seconds.

# Expire a week from now
$c->session(expires => time + 604800);

# Expire a long long time ago
$c->session(expires => 1);

secure

my $secure = $session->secure;
$session   = $session->secure(1);

Set the secure flag on all session cookies, so that browsers send them only over HTTPS connections.

METHODS

Mojolicious::Sessions inherits all methods from Mojo::Base and implements the following ones.

load

$session->load($c);

Load session data from signed cookie.

store

$session->store($c);

Store session data in signed cookie.

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicio.us.