Hi Dmitri,

On 5/17/07, Dmitri Pissarenko <[EMAIL PROTECTED]> wrote:
sub buttonPressed : Local {
    my ( $self, $c ) = @_;

    my $name     = $c->request->params->{name};

    $c->res->write("Hello " . $name . ", welcome to the world of Dojo!\n");
}

This is basically the definition of an XSS vulnerability, I hope this
isn't production code!

Dave

_______________________________________________
List: [email protected]
Listinfo: http://lists.rawmode.org/mailman/listinfo/catalyst
Searchable archive: http://www.mail-archive.com/[email protected]/
Dev site: http://dev.catalyst.perl.org/

Reply via email to