On Jun 15, 2018, at 4:30 PM, David Precious <dav...@preshweb.co.uk> wrote:
> 
> - Validate session IDs read from client - GH #1172 - potential security
>   risk if the session provider in use passes the session ID in a way
>   where injection is possible.

Is there a list of session providers known to do this?  I don’t expect it to be 
complete, but I suspect that, like me, most people will have no way to evaluate 
whether their session providers are vulnerable.

Obviously new systems still based on D1 will go out with this new version.  The 
question is, do we go back and patch all of those already deployed?  In our 
world, that’s not especially easy, so we’re not going to do it if we’re not 
actually vulnerable.
_______________________________________________
dancer-users mailing list
dancer-users@dancer.pm
http://lists.preshweb.co.uk/mailman/listinfo/dancer-users

Reply via email to