Security Advisories (2)
CVE-2012-5572 (2014-05-30)

CRLF injection vulnerability in the cookie method allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a cookie name.

CVE-2011-1589 (2011-04-05)

Directory traversal vulnerability (Mojolicious report, but Dancer was vulnerable as well).

NAME

Dancer::Session::Simple - in-memory session backend for Dancer

DESCRIPTION

This module implements a very simple session backend, holding all session data in memory. This means that sessions are volatile, and no longer exist when the process exits. This module is likely to be most useful for testing purposes.

CONFIGURATION

The setting session should be set to Simple in order to use this session engine in a Dancer application.

AUTHOR

This module has been written by David Precious, see the AUTHORS file for details.

SEE ALSO

See Dancer::Session for details about session usage in route handlers.

COPYRIGHT

This module is copyright (c) 2010 David Precious <davidp@preshweb.co.uk>

LICENSE

This module is free software and is released under the same terms as Perl itself.