0
0
Cybersecurityknowledge~10 mins

Cross-site request forgery (CSRF) in Cybersecurity - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Cross-site request forgery (CSRF)
User logged into Site A
User visits malicious Site B
Site B sends hidden request to Site A
Browser sends request with User's cookies
Site A processes request as if from User
Unintended action happens on Site A
This flow shows how a user logged into one site can be tricked by another site to perform unwanted actions without their knowledge.
Execution Sample
Cybersecurity
User logged in to BankSite
User visits MaliciousSite
MaliciousSite sends hidden form POST to BankSite
Browser sends request with BankSite cookies
BankSite processes request as valid
This example shows how a malicious site can cause a user's browser to send a request to a trusted site using the user's credentials.
Analysis Table
StepActionRequest Sent?Cookies Included?Site ProcessingResult
1User logs into BankSiteNoNoN/AUser authenticated on BankSite
2User visits MaliciousSiteNoNoN/AUser on MaliciousSite page
3MaliciousSite creates hidden form targeting BankSiteNoNoN/AForm ready to submit
4MaliciousSite auto-submits formYesYes (BankSite cookies)BankSite receives requestRequest treated as from user
5BankSite performs action (e.g., transfer money)N/AN/AAction executedUnintended transaction occurs
6User unaware of actionN/AN/AN/ASecurity breach due to CSRF
💡 Process ends after BankSite executes the unintended action triggered by the forged request.
State Tracker
VariableStartAfter Step 2After Step 4Final
User AuthenticationLogged inLogged inLogged inLogged in
Request SentNoNoYesYes
Cookies IncludedNoNoYesYes
Site ActionNoneNoneUnintended actionUnintended action
Key Insights - 3 Insights
Why does the malicious request include the user's cookies even though the user did not submit it?
Because the browser automatically includes cookies for the target site with any request sent to that site, as shown in step 4 of the execution_table.
Why does the trusted site process the malicious request as if it came from the user?
Because the request includes valid authentication cookies, so the site assumes it is a legitimate user action, as seen in step 4 and 5.
Why is the user unaware of the unintended action?
Because the malicious request happens in the background without user interaction, and the user is on a different site, as shown in step 6.
Visual Quiz - 3 Questions
Test your understanding
Look at the execution_table at step 4. What is true about the request sent?
AIt is sent from the user directly
BIt does not include any cookies
CIt includes the user's cookies for BankSite
DIt is blocked by the browser
💡 Hint
Check the 'Cookies Included?' column at step 4 in the execution_table.
At which step does the BankSite perform the unintended action?
AStep 3
BStep 5
CStep 4
DStep 6
💡 Hint
Look at the 'Site Processing' and 'Result' columns in the execution_table.
If the browser did not send cookies with the request, what would happen?
AThe request would be rejected or treated as unauthenticated
BThe malicious site would gain access to user data
CThe request would still be processed as valid
DThe user would be logged out automatically
💡 Hint
Refer to the importance of cookies in the 'Cookies Included?' column in the execution_table.
Concept Snapshot
Cross-site request forgery (CSRF) tricks a logged-in user's browser into sending unwanted requests to a trusted site.
The browser includes authentication cookies automatically.
The trusted site processes the request as if from the user.
This can cause unintended actions like money transfers.
Protection involves verifying requests with tokens or checking origins.
Full Transcript
Cross-site request forgery (CSRF) happens when a user logged into a trusted site visits a malicious site that secretly sends a request to the trusted site. The browser automatically includes the user's authentication cookies with this request. The trusted site processes the request as if it came from the user, causing unintended actions like unauthorized transactions. The user does not realize this because the malicious request happens in the background. Understanding this flow helps in recognizing why CSRF is a security risk and why protections like tokens are necessary.