1. Web Security Academy
  2. CSRF
  3. Lab

Lab: CSRF where Referer validation depends on header being present

This lab's email change functionality is vulnerable to CSRF. It attempts to block cross domain requests but has an insecure fallback.

To solve the lab, use your exploit server to host an HTML page that uses a CSRF attack to change the viewer's email address.

You have an account on the application that you can use to help design your attack. The credentials are: carlos / montoya.

Want to track your progress and have a more personalized learning experience? (It's free!)

Sign up Login