1. Web Security Academy
  2. CSRF
  3. Lab

Lab: CSRF where token is duplicated in cookie


This lab's email change functionality is vulnerable to CSRF. It attempts to use the insecure "double submit" CSRF prevention technique.

To solve the lab, use your exploit server to host an HTML page that uses a CSRF attack to change the viewer's email address.

You have an account on the application that you can use to help design your attack. The credentials are: carlos / montoya.