Plack-Middleware-XSRFBlock 0.0.4 Deleted
Security Advisories
CVE-2023-52431
When not using signed cookies, it was possible to bypass XSRFBlock by POSTing an empty form value and an empty cookie
Fixed version: >=0.0.19
Reported: 2023-07-14
Kwalitee Issues
This is not the latest release. The following issues may have already been fixed in the newer releases.
No Core Issues.
- meta_yml_declares_perl_version
-
If you are using Build.PL define the {requires}{perl} = VERSION field. If you are using MakeMaker (Makefile.PL) you should upgrade ExtUtils::MakeMaker to 6.48 and use MIN_PERL_VERSION parameter. Perl::MinimumVersion can help you determine which version of Perl your module needs.
- meta_yml_has_provides
-
Add all modules contained in this distribution to the META.yml field 'provides'. Module::Build or Dist::Zilla::Plugin::MetaProvides do this automatically for you.
Modules
Name | Abstract | Version | View |
---|---|---|---|
Plack::Middleware::XSRFBlock | Block XSRF Attacks with minimal changes to your app | 0.000004 | metacpan |