Security Advisories (10)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CVE-2020-36829 (2020-11-10)

Mojo::Util secure_compare can leak the string length. By immediately returning when the two strings are not the same length, the function allows an attacker to guess the length of the secret string using timing attacks.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user's session.

NAME

ojo - Fun Oneliners with Mojo!

SYNOPSIS

perl -Mojo -e 'b(g("mojolicio.us")->dom->at("title")->text)->say'

DESCRIPTION

A collection of automatically exported functions for fun Perl oneliners.

FUNCTIONS

ojo implements the following functions.

a

my $app = a('/' => sub { shift->render(json => {hello => 'world'}) });

Create a route with "any" in Mojolicious::Lite and return the current Mojolicious::Lite object.

perl -Mojo -e 'a("/" => {text => "Hello Mojo!"})->start' daemon

b

my $stream = b('lalala');

Turn string into a Mojo::ByteStream object.

perl -Mojo -e 'b(g("mojolicio.us")->body)->html_unescape->say'

c

my $collection = c(1, 2, 3);

Turn list into a Mojo::Collection object. Note that this function is EXPERIMENTAL and might change without warning!

d

my $res = d('http://mojolicio.us');

Perform DELETE request with "delete" in Mojo::UserAgent and return resulting Mojo::Message::Response object.

f

my $res = f('http://kraih.com/foo' => {test => 123});

Perform POST form request with "post_form" in Mojo::UserAgent and return resulting Mojo::Message::Response object.

g

my $res = g('http://mojolicio.us');

Perform GET request with "get" in Mojo::UserAgent and return resulting Mojo::Message::Response object. One redirect will be followed by default, you can change this behavior with the MOJO_MAX_REDIRECTS environment variable.

MOJO_MAX_REDIRECTS=0 perl -Mojo -e 'b(g("mojolicio.us")->code)->say'

h

my $res = h('http://mojolicio.us');

Perform HEAD request with "head" in Mojo::UserAgent and return resulting Mojo::Message::Response object.

p

my $res = p('http://mojolicio.us');

Perform POST request with "post" in Mojo::UserAgent and return resulting Mojo::Message::Response object.

u

my $res = u('http://mojolicio.us');

Perform PUT request with "put" in Mojo::UserAgent and return resulting Mojo::Message::Response object.

x

my $dom = x('<div>Hello!</div>');

Turn HTML5/XML input into Mojo::DOM object.

say x('<div>Hello!</div>')->at('div')->text;

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicio.us.