libcgi-application-plugin-protectcsrf-perl 1.01-3 source package in Ubuntu

Changelog

libcgi-application-plugin-protectcsrf-perl (1.01-3) unstable; urgency=medium

  [ Salvatore Bonaccorso ]
  * debian/control: Use HTTPS transport protocol for Vcs-Git URI

  [ gregor herrmann ]
  * Change bugtracker URL(s) to HTTPS.
  * debian/copyright: change Copyright-Format 1.0 URL to HTTPS.
  * Remove Jaldhar H. Vyas from Uploaders. Thanks for your work!

  [ Salvatore Bonaccorso ]
  * Update Vcs-* headers for switch to salsa.debian.org

  [ gregor herrmann ]
  * debian/watch: use uscan version 4.

 -- Jelmer Vernooij <email address hidden>  Fri, 10 Jun 2022 00:41:02 +0100

Upload details

Uploaded by:
Debian Perl Group
Uploaded to:
Sid
Original maintainer:
Debian Perl Group
Architectures:
all
Section:
perl
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe perl
Noble release universe perl
Mantic release universe perl
Lunar release universe perl

Builds

Kinetic: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
libcgi-application-plugin-protectcsrf-perl_1.01-3.dsc 2.4 KiB 42f88ce7a6a5a16d15e00c13949ccfdf6399a3b6fe719381bd04eb61cf872d3e
libcgi-application-plugin-protectcsrf-perl_1.01.orig.tar.gz 6.7 KiB 7b51d210b42119ca663c7ac718596161ad54c89bb9144ca9aff1f0af4d6aca61
libcgi-application-plugin-protectcsrf-perl_1.01-3.debian.tar.xz 5.8 KiB 6aeda1dda33f40bc9df32cbc6f7572feae921a5bec9aca8dff84cdecf943fd01

Available diffs

No changes file available.

Binary packages built by this source

libcgi-application-plugin-protectcsrf-perl: plugin to generate and verify anti-CSRF challenges

 CGI::Application::Plugin::ProtectCSRF is a CGI::Application plugin that
 helps protect against CSRF attacks. It works by tying back the processing
 of a form to the display of a form.
 .
 A cross-site request forgery is a form of online attack in which Mr Attacker
 posts what appears to be an image in, say, a forum. However the image src
 attribute is carefully crafted to undertake some action desired by Mr Attacker
 on the target website. The trap is sprung when Mr Victim, logs on to the
 target website and then views the image set up by Mr Attacker in the same
 browser.