blib/lib/Apache2/TaintRequest.pm | |||
---|---|---|---|
Criterion | Covered | Total | % |
statement | 7 | 9 | 77.7 |
branch | n/a | ||
condition | n/a | ||
subroutine | 3 | 3 | 100.0 |
pod | n/a | ||
total | 10 | 12 | 83.3 |
line | stmt | bran | cond | sub | pod | time | code |
---|---|---|---|---|---|---|---|
1 | package Apache2::TaintRequest; | ||||||
2 | |||||||
3 | 1 | 1 | 24128 | use strict; | |||
1 | 2 | ||||||
1 | 40 | ||||||
4 | 1 | 1 | 5 | use warnings; | |||
1 | 2 | ||||||
1 | 124 | ||||||
5 | |||||||
6 | =head1 NAME | ||||||
7 | |||||||
8 | Apache2::TaintRequest - HTML Escape tainted data to prevent CSS Attacks | ||||||
9 | |||||||
10 | =head1 SYNOPSIS | ||||||
11 | |||||||
12 | use Apache2::TaintRequest (); | ||||||
13 | |||||||
14 | sub handler { | ||||||
15 | my $r = shift; | ||||||
16 | $r = Apache2::TaintRequest->new($r); | ||||||
17 | |||||||
18 | my $querystring = $r->query_string(); | ||||||
19 | $r->print($querystring); # html is escaped... | ||||||
20 | |||||||
21 | $querystring =~ s/ |