This lab's email change functionality is vulnerable to CSRF. It attempts to detect and block cross domain requests, but the detection mechanism can be bypassed.
To solve the lab, use your exploit server to host an HTML page that uses a CSRF attack to change the viewer's email address.
You can log in to your own account using the following credentials: wiener:peter
With your browser proxying traffic through Burp Suite, log in to your account, submit the "Update email" form, and find the resulting request in your Proxy history.
Send the request to Burp Repeater and observe that if you change the domain in the Referer HTTP header the request is rejected.
Copy the original domain into the Referer's query string and observe that the request is now accepted.
Create and host a proof of concept exploit as described in the solution to the CSRF vulnerability with no defenses lab. Include the following JavaScript in the script block to alter the URL and Referer:
history.pushState("", "", "/?$original-domain")
Want to track your progress and have a more personalized learning experience? (It's free!)