libcgi-application-plugin-protectcsrf-perl 1.01-2 source package in Ubuntu


libcgi-application-plugin-protectcsrf-perl (1.01-2) unstable; urgency=low

  * Team upload

  [ gregor herrmann ]
  * debian/control: update {versioned,alternative} (build) dependencies.

  [ Salvatore Bonaccorso ]
  * Change Vcs-Git to canonical URI (git://
  * Change based URIs to based URIs

  [ Axel Beckert ]
  * debian/copyright: migrate pre-1.0 format to 1.0 using "cme fix dpkg-

  [ gregor herrmann ]
  * debian/control: remove Nicholas Bamber from Uploaders on request of
    the MIA team.
  * Strip trailing slash from metacpan URLs.

  [ Salvatore Bonaccorso ]
  * Update Vcs-Browser URL to cgit web frontend

  [ Damyan Ivanov ]
  * Mark package as autopkgtestable
  * Declare compliance with Debian Policy 3.9.6
  * Add explicit build dependency on libmodule-build-perl

 -- Damyan Ivanov <email address hidden>  Wed, 10 Jun 2015 12:23:02 +0000

Upload details

Uploaded by:
Debian Perl Group on 2015-06-10
Uploaded to:
Original maintainer:
Debian Perl Group
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Groovy release on 2020-04-24 universe perl
Focal release on 2019-10-18 universe perl
Bionic release on 2017-10-24 universe perl
Xenial release on 2015-10-22 universe perl


Wily: [FULLYBUILT] amd64


File Size SHA-256 Checksum
libcgi-application-plugin-protectcsrf-perl_1.01-2.dsc 2.5 KiB 43c7e01df9b59951b060036183cf180dd4de9689d5504f4708415165dbe2c46e
libcgi-application-plugin-protectcsrf-perl_1.01.orig.tar.gz 6.7 KiB 7b51d210b42119ca663c7ac718596161ad54c89bb9144ca9aff1f0af4d6aca61
libcgi-application-plugin-protectcsrf-perl_1.01-2.debian.tar.xz 5.7 KiB d403d59ad0bdf303c59f48c8d398e0c92e5cf712b16e96df843d467a4fbfede8

Available diffs

No changes file available.

Binary packages built by this source

libcgi-application-plugin-protectcsrf-perl: plugin to generate and verify anti-CSRF challenges

 CGI::Application::Plugin::ProtectCSRF is a CGI::Application plugin that
 helps protect against CSRF attacks. It works by tying back the processing
 of a form to the display of a form.
 A cross-site request forgery is a form of online attack in which Mr Attacker
 posts what appears to be an image in, say, a forum. However the image src
 attribute is carefully crafted to undertake some action desired by Mr Attacker
 on the target website. The trap is sprung when Mr Victim, logs on to the
 target website and then views the image set up by Mr Attacker in the same