Search⌘ K
AI Features

Cross-Site Request Forgery

Explore how Cross-Site Request Forgery attacks manipulate authenticated users into unintended actions on vulnerable web apps. Learn to identify link-based, form-based, and image-based CSRF methods, and apply mitigation strategies to protect web applications from these security risks.

Overview

Technological advancements have led to the development of rather sophisticated attacks. With each passing day, adversaries are mitigated, but that doesn’t stop them; they come up with new ways of circumventing security. One such act of cleverness, at least when it was first discovered, is the cross-site request forgery (CSRF) attack.

What is a CSRF

...