libcgi-application-plugin-protectcsrf-perl 1.01-3 source package in Ubuntu
Changelog
libcgi-application-plugin-protectcsrf-perl (1.01-3) unstable; urgency=medium [ Salvatore Bonaccorso ] * debian/control: Use HTTPS transport protocol for Vcs-Git URI [ gregor herrmann ] * Change bugtracker URL(s) to HTTPS. * debian/copyright: change Copyright-Format 1.0 URL to HTTPS. * Remove Jaldhar H. Vyas from Uploaders. Thanks for your work! [ Salvatore Bonaccorso ] * Update Vcs-* headers for switch to salsa.debian.org [ gregor herrmann ] * debian/watch: use uscan version 4. -- Jelmer Vernooij <email address hidden> Fri, 10 Jun 2022 00:41:02 +0100
Upload details
- Uploaded by:
- Debian Perl Group
- Uploaded to:
- Sid
- Original maintainer:
- Debian Perl Group
- Architectures:
- all
- Section:
- perl
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Oracular | release | universe | perl | |
Noble | release | universe | perl | |
Mantic | release | universe | perl | |
Lunar | release | universe | perl |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
libcgi-application-plugin-protectcsrf-perl_1.01-3.dsc | 2.4 KiB | 42f88ce7a6a5a16d15e00c13949ccfdf6399a3b6fe719381bd04eb61cf872d3e |
libcgi-application-plugin-protectcsrf-perl_1.01.orig.tar.gz | 6.7 KiB | 7b51d210b42119ca663c7ac718596161ad54c89bb9144ca9aff1f0af4d6aca61 |
libcgi-application-plugin-protectcsrf-perl_1.01-3.debian.tar.xz | 5.8 KiB | 6aeda1dda33f40bc9df32cbc6f7572feae921a5bec9aca8dff84cdecf943fd01 |
Available diffs
- diff from 1.01-2.1 to 1.01-3 (1.9 KiB)
No changes file available.
Binary packages built by this source
- libcgi-application-plugin-protectcsrf-perl: plugin to generate and verify anti-CSRF challenges
CGI::Applicati
on::Plugin: :ProtectCSRF is a CGI::Application plugin that
helps protect against CSRF attacks. It works by tying back the processing
of a form to the display of a form.
.
A cross-site request forgery is a form of online attack in which Mr Attacker
posts what appears to be an image in, say, a forum. However the image src
attribute is carefully crafted to undertake some action desired by Mr Attacker
on the target website. The trap is sprung when Mr Victim, logs on to the
target website and then views the image set up by Mr Attacker in the same
browser.