Cross-Site Request Forgery

The access to a URL should not trigger implicit actions.

An attacker could craft a URL and maliciously trigger the request from the victim's browser using implicitly the victim's credentials.

This can be done using an <img src="..."> tag on a malicious web site.

Example

A URL like this /hotels/123456/book?startDate=... should not trigger booking...

... except if the URL contains a complex and unpredictable token which is verified by the backend.

Last updated