Security Advisories (10)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2015-01 (2015-02-02)

Directory traversal on Windows

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CVE-2020-36829 (2020-11-10)

Mojo::Util secure_compare can leak the string length. By immediately returning when the two strings are not the same length, the function allows an attacker to guess the length of the secret string using timing attacks.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CPANSA-Mojolicious-2014-01 (2014-10-07)

Context sensitivity of method param could lead to parameter injection attacks.

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user's session.

NAME

Mojo::ByteStream - ByteStream

SYNOPSIS

# Manipulate bytestreams
use Mojo::ByteStream;
my $stream = Mojo::ByteStream->new('foo_bar_baz');
say $stream->camelize;

# Chain methods
my $stream = Mojo::ByteStream->new('foo bar baz')->quote;
$stream = $stream->unquote->encode('UTF-8')->b64_encode('');
say "$stream";

# Use the alternative constructor
use Mojo::ByteStream 'b';
my $stream = b('foobarbaz')->html_escape;

DESCRIPTION

Mojo::ByteStream provides a more friendly API for the bytestream manipulation functions in Mojo::Util.

FUNCTIONS

Mojo::ByteStream implements the following functions.

b

my $stream = b('test123');

Construct a new Mojo::ByteStream object.

METHODS

Mojo::ByteStream implements the following methods.

new

my $stream = Mojo::ByteStream->new('test123');

Construct a new Mojo::ByteStream object.

b64_decode

$stream = $stream->b64_decode;

Base64 decode bytestream with "b64_decode" in Mojo::Util.

b64_encode

$stream = $stream->b64_encode;
$stream = $stream->b64_encode("\n");

Base64 encode bytestream with "b64_encode" in Mojo::Util.

b('foo bar baz')->b64_encode('')->say;

camelize

$stream = $stream->camelize;

Camelize bytestream with "camelize" in Mojo::Util.

clone

my $stream2 = $stream->clone;

Clone bytestream.

decamelize

$stream = $stream->decamelize;

Decamelize bytestream with "decamelize" in Mojo::Util.

decode

$stream = $stream->decode;
$stream = $stream->decode('iso-8859-1');

Decode bytestream with "decode" in Mojo::Util, defaults to UTF-8.

$stream->decode('UTF-16LE')->unquote->trim->say;

encode

$stream = $stream->encode;
$stream = $stream->encode('iso-8859-1');

Encode bytestream with "encode" in Mojo::Util, defaults to UTF-8.

$stream->trim->quote->encode->say;

hmac_md5_sum

$stream = $stream->hmac_md5_sum('passw0rd');

Generate HMAC-MD5 checksum for bytestream with "hmac_md5_sum" in Mojo::Util.

hmac_sha1_sum

$stream = $stream->hmac_sha1_sum('passw0rd');

Generate HMAC-SHA1 checksum for bytestream with "hmac_sha1_sum" in Mojo::Util.

b('foo bar baz')->hmac_sha1_sum('secr3t')->quote->say;

html_escape

$stream = $stream->html_escape;
$stream = $stream->html_escape('^\n\r\t !#$%(-;=?-~');

Escape unsafe characters in bytestream with "html_escape" in Mojo::Util.

b('<html>')->html_escape->say;

html_unescape

$stream = $stream->html_unescape;

Unescape all HTML5 entities in bytestream with "html_unescape" in Mojo::Util.

b('&lt;html&gt;')->html_unescape->url_escape->say;

md5_bytes

$stream = $stream->md5_bytes;

Generate binary MD5 checksum for bytestream with "md5_bytes" in Mojo::Util.

md5_sum

$stream = $stream->md5_sum;

Generate MD5 checksum for bytestream with "md5_sum" in Mojo::Util.

punycode_decode

$stream = $stream->punycode_decode;

Punycode decode bytestream with "punycode_decode" in Mojo::Util.

punycode_encode

$stream = $stream->punycode_encode;

Punycode encode bytestream with "punycode_encode" in Mojo::Util.

quote

$stream = $stream->quote;

Quote bytestream with "quote" in Mojo::Util.

say

$stream->say;
$stream->say(*STDERR);

Print bytestream to handle or STDOUT and append a newline.

secure_compare

my $success = $stream->secure_compare($string);

Compare bytestream with "secure_compare" in Mojo::Util.

say 'Match!' if b('foo')->secure_compare('foo');

sha1_bytes

$stream = $stream->sha1_bytes;

Generate binary SHA1 checksum for bytestream with "sha1_bytes" in Mojo::Util.

sha1_sum

$stream = $stream->sha1_sum;

Generate SHA1 checksum for bytestream with "sha1_sum" in Mojo::Util.

size

my $size = $stream->size;

Size of bytestream.

slurp

$stream = $stream->slurp;

Read all data into bytestream with "slurp" in Mojo::Util.

b('/home/sri/myapp.pl')->slurp->split("\n")->shuffle->join("\n")->say;

spurt

$stream = $stream->spurt('/home/sri/myapp.pl');

Write bytestream to file with "spurt" in Mojo::Util.

b('/home/sri/foo.html')->slurp->html_unescape->spurt('/home/sri/bar.html');

split

my $collection = $stream->split(',');

Turn bytestream into Mojo::Collection.

b('a,b,c')->split(',')->pluck('quote')->join(',')->say;

to_string

my $string = $stream->to_string;
my $string = "$stream";

Stringify bytestream.

trim

$stream = $stream->trim;

Trim whitespace characters from both ends of bytestream with "trim" in Mojo::Util.

unquote

$stream = $stream->unquote;

Unquote bytestream with "unquote" in Mojo::Util.

url_escape

$stream = $stream->url_escape;
$stream = $stream->url_escape('^A-Za-z0-9\-._~');

Percent encode all unsafe characters in bytestream with "url_escape" in Mojo::Util.

b('foo bar baz')->url_escape->say;

url_unescape

$stream = $stream->url_unescape;

Decode percent encoded characters in bytestream with "url_unescape" in Mojo::Util.

b('%3Chtml%3E')->url_unescape->html_escape->say;

xml_escape

$stream = $stream->xml_escape;

Escape only the characters &, <, >, " and ' in bytestream, this is a much faster version of html_escape.

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicio.us.