[Catalyst] Potential query string pollution vulnerability?
Octavian Rasnita
orasnita at gmail.com
Tue Jun 16 11:14:28 GMT 2009
From: "Tobias Kremer" <tobias.kremer at gmail.com>
> Hi all,
>
> I just experienced a nasty case of query string pollution
> vulnerability in one of my Catalyst/DBIC apps. I think that the
> circumstances under which this applies are not _that_ rare, so I
> figured it'd be best to inform the world.
>
> Imagine the following code in one of your actions:
>
> sub crashme :Local {
> my( $self, $c ) = @_;
> my $result = [ $c->model( 'Foo' )->search( {
> -or => [
> name => $c->req->param( 'name' )
Try:
name => $c->req->params->{name}
I think this was the recommended way, exactly for the reason you described.
Octavian
More information about the Catalyst
mailing list