X-Git-Url: http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits%2FCatalyst-Runtime.git;a=blobdiff_plain;f=lib%2FCatalyst%2FRequest.pm;h=0cfcbae1c3cc583723dea6507ce508e25760a246;hp=c0d9fcaf2ecdc2ffcbaeddc2d82d756465467015;hb=566678d0245e49d7f2f1abce553b5bdb87879086;hpb=4373973ab65fd23bf7b334a444aba1d526a6f297 diff --git a/lib/Catalyst/Request.pm b/lib/Catalyst/Request.pm index c0d9fca..0cfcbae 100644 --- a/lib/Catalyst/Request.pm +++ b/lib/Catalyst/Request.pm @@ -531,7 +531,7 @@ If the POST is malformed in some way (such as undefined or not content that matches the content-type) we raise a L with the error text as the message. -If the POSTed content type does not match an availabled data handler, this +If the POSTed content type does not match an available data handler, this will also raise an exception. =head2 $req->body_parameters @@ -683,7 +683,7 @@ Basically this is an exploit that takes advantage of how L<\param> will do one t in scalar context and another thing in list context. This is combined with how Perl chooses to deal with duplicate keys in a hash definition by overwriting the value of existing keys with a new value if the same key shows up again. Generally you will be -vulnerale to this exploit if you are using this method in a direct assignment in a +vulnerable to this exploit if you are using this method in a direct assignment in a hash, such as with a L create statement. For example, if you have parameters like: