libcgi-application-plugin-protectcsrf-perl 1.01-2.1 source package in Ubuntu


libcgi-application-plugin-protectcsrf-perl (1.01-2.1) unstable; urgency=medium

  * Non maintainer upload by the Reproducible Builds team.
  * No source change upload to rebuild on buildd with .buildinfo files.

 -- Holger Levsen <email address hidden>  Thu, 07 Jan 2021 15:01:51 +0100

Upload details

Uploaded by:
Debian Perl Group on 2021-01-07
Uploaded to:
Original maintainer:
Debian Perl Group
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Hirsute release on 2021-01-08 universe perl


Hirsute: [FULLYBUILT] amd64


File Size SHA-256 Checksum
libcgi-application-plugin-protectcsrf-perl_1.01-2.1.dsc 2.5 KiB a1f22b8624f815243ab658d0dfba05ac07d4b65d0447d76a0b557e99c89ed62a
libcgi-application-plugin-protectcsrf-perl_1.01.orig.tar.gz 6.7 KiB 7b51d210b42119ca663c7ac718596161ad54c89bb9144ca9aff1f0af4d6aca61
libcgi-application-plugin-protectcsrf-perl_1.01-2.1.debian.tar.xz 5.8 KiB 95f5fdd9b28d2dd609751c685361eb432edc5537b054d069837bc0a5641437bc

Available diffs

No changes file available.

Binary packages built by this source

libcgi-application-plugin-protectcsrf-perl: plugin to generate and verify anti-CSRF challenges

 CGI::Application::Plugin::ProtectCSRF is a CGI::Application plugin that
 helps protect against CSRF attacks. It works by tying back the processing
 of a form to the display of a form.
 A cross-site request forgery is a form of online attack in which Mr Attacker
 posts what appears to be an image in, say, a forum. However the image src
 attribute is carefully crafted to undertake some action desired by Mr Attacker
 on the target website. The trap is sprung when Mr Victim, logs on to the
 target website and then views the image set up by Mr Attacker in the same