summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMårten Nordheim <[email protected]>2020-03-18 09:39:36 +0100
committerMårten Nordheim <[email protected]>2020-03-19 14:15:04 +0000
commitb77e239c5e7d3befbd48200aa51c5ff9b51d07f0 (patch)
treea59d97a1ae0bb9f06c18139383347c1679da23a2
parent45fe7adcb89609e8dc909ba3e55ab03abe7e4722 (diff)
Fix perl script warning
The apache logs are filled with warnings about this when it's used. https://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/ Change-Id: I977d2b022d706d9587c033fd8e80f129e60c439c Reviewed-by: Timur Pocheptsov <[email protected]> Reviewed-by: Edward Welbourne <[email protected]>
-rwxr-xr-xtests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi2
1 files changed, 1 insertions, 1 deletions
diff --git a/tests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi b/tests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi
index 6973875cc93..60c0c0e8ad5 100755
--- a/tests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi
+++ b/tests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi
@@ -11,7 +11,7 @@ print "content type: $contentType\n";
if ($contentType =~ /^multipart\/form-data/) {
foreach my $key ($q->param) {
- foreach my $value ($q->param($key)) {
+ foreach my $value (scalar $q->param($key)) {
if ($key =~ /text/) {
$retValue = $value;
} else {