[Catalyst] Potential query string pollution vulnerability?

Octavian Rasnita orasnita at gmail.com
Tue Jun 16 11:14:28 GMT 2009


From: "Tobias Kremer" <tobias.kremer at gmail.com>
> Hi all,
> 
> I just experienced a nasty case of query string pollution
> vulnerability in one of my Catalyst/DBIC apps. I think that the
> circumstances under which this applies are not _that_ rare, so I
> figured it'd be best to inform the world.
> 
> Imagine the following code in one of your actions:
> 
> sub crashme :Local {
>    my( $self, $c ) = @_;
>    my $result = [ $c->model( 'Foo' )->search( {
>        -or => [
>            name => $c->req->param( 'name' )

Try:

name => $c->req->params->{name}

I think this was the recommended way, exactly for the reason you described.

Octavian




More information about the Catalyst mailing list