Security Advisories (8)
CPANSA-Mojolicious-2022-03 (2022-12-10)

Mojo::DOM did not correctly parse <script> tags.

CPANSA-Mojolicious-2021-02 (2021-06-01)

Small sessions could be used as part of a brute-force attack to decode the session secret.

CVE-2021-47208 (2021-03-16)

A bug in format detection can potentially be exploited for a DoS attack.

CVE-2018-25100 (2018-02-13)

Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.

CPANSA-Mojolicious-2018-03 (2018-05-19)

Mojo::UserAgent was not checking peer SSL certificates by default.

CVE-2020-36829 (2020-11-10)

Mojo::Util secure_compare can leak the string length. By immediately returning when the two strings are not the same length, the function allows an attacker to guess the length of the secret string using timing attacks.

CPANSA-Mojolicious-2018-02 (2018-05-11)

GET requests with embedded backslashes can be used to access local files on Windows hosts

CVE-2024-58134 (2025-05-03)

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies. An attacker who knows or guesses the secret could compute valid HMAC signatures for the session cookie, allowing them to tamper with or hijack another user's session.

NAME

Mojo::IOLoop::TLS - Non-blocking TLS handshake

SYNOPSIS

use Mojo::IOLoop::TLS;

# Negotiate TLS
my $tls = Mojo::IOLoop::TLS->new($old_handle);
$tls->on(upgrade => sub {
  my ($tls, $new_handle) = @_;
  ...
});
$tls->on(error => sub {
  my ($tls, $err) = @_;
  ...
});
$tls->negotiate(server => 1, tls_version => 'TLSv1_2');

# Start reactor if necessary
$tls->reactor->start unless $tls->reactor->is_running;

DESCRIPTION

Mojo::IOLoop::TLS negotiates TLS for Mojo::IOLoop.

EVENTS

Mojo::IOLoop::TLS inherits all events from Mojo::EventEmitter and can emit the following new ones.

upgrade

$tls->on(upgrade => sub {
  my ($tls, $handle) = @_;
  ...
});

Emitted once TLS has been negotiated.

error

$tls->on(error => sub {
  my ($tls, $err) = @_;
  ...
});

Emitted if an error occurs during negotiation, fatal if unhandled.

ATTRIBUTES

Mojo::IOLoop::TLS implements the following attributes.

reactor

my $reactor = $tls->reactor;
$tls        = $tls->reactor(Mojo::Reactor::Poll->new);

Low-level event reactor, defaults to the reactor attribute value of the global Mojo::IOLoop singleton.

METHODS

Mojo::IOLoop::TLS inherits all methods from Mojo::EventEmitter and implements the following new ones.

can_tls

my $bool = Mojo::IOLoop::TLS->can_tls;

True if IO::Socket::SSL 1.94+ is installed and TLS support enabled.

negotiate

$tls->negotiate(server => 1, tls_version => 'TLSv1_2');
$tls->negotiate({server => 1, tls_version => 'TLSv1_2'});

Negotiate TLS.

These options are currently available:

server
server => 1

Negotiate TLS from the server-side, defaults to the client-side.

tls_ca
tls_ca => '/etc/tls/ca.crt'

Path to TLS certificate authority file. Also activates hostname verification on the client-side.

tls_cert
tls_cert => '/etc/tls/server.crt'
tls_cert => {'mojolicious.org' => '/etc/tls/mojo.crt'}

Path to the TLS cert file, defaults to a built-in test certificate on the server-side.

tls_ciphers
tls_ciphers => 'AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH'

TLS cipher specification string. For more information about the format see https://www.openssl.org/docs/manmaster/apps/ciphers.html#CIPHER-STRINGS.

tls_key
tls_key => '/etc/tls/server.key'
tls_key => {'mojolicious.org' => '/etc/tls/mojo.key'}

Path to the TLS key file, defaults to a built-in test key on the server-side.

tls_verify
tls_verify => 0x00

TLS verification mode, defaults to 0x03 on the server-side and 0x01 on the client-side if a certificate authority file has been provided, or 0x00.

tls_version
tls_version => 'TLSv1_2'

TLS protocol version.

new

my $tls = Mojo::IOLoop::TLS->new($handle);

Construct a new Mojo::IOLoop::Stream object.

SEE ALSO

Mojolicious, Mojolicious::Guides, http://mojolicious.org.