diff options
author | Mårten Nordheim <marten.nordheim@qt.io> | 2020-03-18 09:39:36 +0100 |
---|---|---|
committer | Mårten Nordheim <marten.nordheim@qt.io> | 2020-03-19 14:15:04 +0000 |
commit | b77e239c5e7d3befbd48200aa51c5ff9b51d07f0 (patch) | |
tree | a59d97a1ae0bb9f06c18139383347c1679da23a2 | |
parent | 45fe7adcb89609e8dc909ba3e55ab03abe7e4722 (diff) |
Fix perl script warning
The apache logs are filled with warnings about this when it's used.
https://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/
Change-Id: I977d2b022d706d9587c033fd8e80f129e60c439c
Reviewed-by: Timur Pocheptsov <timur.pocheptsov@qt.io>
Reviewed-by: Edward Welbourne <edward.welbourne@qt.io>
-rwxr-xr-x | tests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/tests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi b/tests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi index 6973875cc9..60c0c0e8ad 100755 --- a/tests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi +++ b/tests/testserver/apache2/testdata/www/cgi-bin/multipart.cgi @@ -11,7 +11,7 @@ print "content type: $contentType\n"; if ($contentType =~ /^multipart\/form-data/) { foreach my $key ($q->param) { - foreach my $value ($q->param($key)) { + foreach my $value (scalar $q->param($key)) { if ($key =~ /text/) { $retValue = $value; } else { |