How to Install and Uninstall libcgi-application-plugin-protectcsrf-perl Package on Ubuntu 20.10 (Groovy Gorilla)

Last updated: May 17,2024

1. Install "libcgi-application-plugin-protectcsrf-perl" package

Please follow the guidelines below to install libcgi-application-plugin-protectcsrf-perl on Ubuntu 20.10 (Groovy Gorilla)

$ sudo apt update $ sudo apt install libcgi-application-plugin-protectcsrf-perl

2. Uninstall "libcgi-application-plugin-protectcsrf-perl" package

Please follow the instructions below to uninstall libcgi-application-plugin-protectcsrf-perl on Ubuntu 20.10 (Groovy Gorilla):

$ sudo apt remove libcgi-application-plugin-protectcsrf-perl $ sudo apt autoclean && sudo apt autoremove

3. Information about the libcgi-application-plugin-protectcsrf-perl package on Ubuntu 20.10 (Groovy Gorilla)

Package: libcgi-application-plugin-protectcsrf-perl
Architecture: all
Version: 1.01-2
Priority: optional
Section: universe/perl
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Perl Group
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 68
Depends: perl, libcgi-application-plugin-session-perl, libhtml-parser-perl
Breaks: libcgi-application-extra-plugin-bundle-perl (<< 0.5)
Replaces: libcgi-application-extra-plugin-bundle-perl (<< 0.5)
Enhances: libcgi-application-perl
Filename: pool/universe/libc/libcgi-application-plugin-protectcsrf-perl/libcgi-application-plugin-protectcsrf-perl_1.01-2_all.deb
Size: 11454
MD5sum: ade68776ca77e23210ec7cbd5d50cf01
SHA1: aa26293bcf8baa9613851c1acb0e9ff777f3a9e6
SHA256: 8a1fe609fd93857ec53f23b3e8cb88e1c03e2363665577de4dd3fe60946bfacc
SHA512: bc856cf8cf8f1011095d8b25ed89b8cb62688e3576f46204388c635b1af2a6964f6772b5d556dede28c040cf8cf95d309af9cc1cdc5f4dc1bf60c7dae6d358c9
Homepage: https://metacpan.org/release/CGI-Application-Plugin-ProtectCSRF
Description-en: plugin to generate and verify anti-CSRF challenges
CGI::Application::Plugin::ProtectCSRF is a CGI::Application plugin that
helps protect against CSRF attacks. It works by tying back the processing
of a form to the display of a form.
.
A cross-site request forgery is a form of online attack in which Mr Attacker
posts what appears to be an image in, say, a forum. However the image src
attribute is carefully crafted to undertake some action desired by Mr Attacker
on the target website. The trap is sprung when Mr Victim, logs on to the
target website and then views the image set up by Mr Attacker in the same
browser.
Description-md5: 923d8f844f6c1846c138e482d332d972