How to Install and Uninstall libcgi-application-plugin-protectcsrf-perl Package on Ubuntu 21.04 (Hirsute Hippo)

Last updated: May 17,2024

1. Install "libcgi-application-plugin-protectcsrf-perl" package

Please follow the guidelines below to install libcgi-application-plugin-protectcsrf-perl on Ubuntu 21.04 (Hirsute Hippo)

$ sudo apt update $ sudo apt install libcgi-application-plugin-protectcsrf-perl

2. Uninstall "libcgi-application-plugin-protectcsrf-perl" package

Please follow the step by step instructions below to uninstall libcgi-application-plugin-protectcsrf-perl on Ubuntu 21.04 (Hirsute Hippo):

$ sudo apt remove libcgi-application-plugin-protectcsrf-perl $ sudo apt autoclean && sudo apt autoremove

3. Information about the libcgi-application-plugin-protectcsrf-perl package on Ubuntu 21.04 (Hirsute Hippo)

Package: libcgi-application-plugin-protectcsrf-perl
Architecture: all
Version: 1.01-2.1
Priority: optional
Section: universe/perl
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Perl Group
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 34
Depends: perl:any, perl, libcgi-application-plugin-session-perl, libhtml-parser-perl
Breaks: libcgi-application-extra-plugin-bundle-perl (<< 0.5)
Replaces: libcgi-application-extra-plugin-bundle-perl (<< 0.5)
Enhances: libcgi-application-perl
Filename: pool/universe/libc/libcgi-application-plugin-protectcsrf-perl/libcgi-application-plugin-protectcsrf-perl_1.01-2.1_all.deb
Size: 11604
MD5sum: 03b7e99f9f5ca848ecc43c42e43cdd7d
SHA1: abd630a0e447deeb40dfe6fd800e8513dee5d3d0
SHA256: c702eb2f444097bc49e3da35bdb247a38673ee5a0997773a090ff01834115e18
SHA512: 57662f5c7bfc39e38b081bf20472211b40908afe594aa823d2defa4d9e846bbf362cb9a48965b5d3a76bc90a3018ed0b6b754579efe830b01a96e89b893d2be7
Homepage: https://metacpan.org/release/CGI-Application-Plugin-ProtectCSRF
Description-en: plugin to generate and verify anti-CSRF challenges
CGI::Application::Plugin::ProtectCSRF is a CGI::Application plugin that
helps protect against CSRF attacks. It works by tying back the processing
of a form to the display of a form.
.
A cross-site request forgery is a form of online attack in which Mr Attacker
posts what appears to be an image in, say, a forum. However the image src
attribute is carefully crafted to undertake some action desired by Mr Attacker
on the target website. The trap is sprung when Mr Victim, logs on to the
target website and then views the image set up by Mr Attacker in the same
browser.
Description-md5: 923d8f844f6c1846c138e482d332d972