Security Advisories (1)
CVE-2025-30673 (2025-04-01)

Sub::HandlesVia for Perl before 0.050002 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may be loaded instead of the intended file, potentially leading to arbitrary code execution. Sub::HandlesVia uses Mite to produce the affected code section due to CVE-2025-30672

Changes for version 0.024 - 2022-06-15

  • Documentation
    • Explicitly document that Sub::HandlesVia needs to be imported AFTER Moo/Moose/Mouse so that it can detect the class/role builder being used.
  • Test Suite
    • Test that Sub::HandlesVia works okay with MooseX::Extended.

Modules

alternative handles_via implementation
looks at a Handler and generates a string of Perl code for it
template for a method that can be delegated to
library of array-related methods
library of bool-related methods
library of code-related methods
library of counter-related methods
library of hash-related methods
library of number-related methods
library of scalar-related methods
library of string-related methods
integration with OO frameworks for Sub::HandlesVia

Provides

in lib/Sub/HandlesVia/Handler.pm
in lib/Sub/HandlesVia/Handler.pm
in lib/Sub/HandlesVia/HandlerLibrary.pm
in lib/Sub/HandlesVia/Toolkit/Moo.pm
in lib/Sub/HandlesVia/Toolkit/Moose.pm
in lib/Sub/HandlesVia/Toolkit/Moose.pm
in lib/Sub/HandlesVia/Toolkit/Moose.pm
in lib/Sub/HandlesVia/Toolkit/Mouse.pm
in lib/Sub/HandlesVia/Toolkit/Mouse.pm
in lib/Sub/HandlesVia/Toolkit/Mouse.pm
in lib/Sub/HandlesVia/Toolkit/Plain.pm