{"id":"MGASA-2013-0183","summary":"Updated perl-Dancer package fixes CVE-2012-5572","details":"A security flaw was found in the way Dancer.pm, lightweight yet powerful web\napplication framework / Perl language module, performed sanitization of values\nto be used for cookie() and cookies() methods. A remote attacker could use this\nflaw to inject arbitrary headers into responses from (Perl) applications, that\nuse Dancer.pm (CVE-2012-5572).\n","modified":"2026-04-16T04:42:33.065120827Z","published":"2013-06-26T18:11:16Z","upstream":["CVE-2012-5572"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0183.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/pipermail/package-announce/2013-June/108749.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=10523"}],"affected":[{"package":{"name":"perl-Dancer","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/perl-Dancer?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.311.500-1.mga2"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0183.json"}},{"package":{"name":"perl-Dancer","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/perl-Dancer?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.311.500-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0183.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}