{"version":"1.0","provider_name":"ValeurBit Infosec","provider_url":"https:\/\/valeurbit.com\/blog","author_name":"Yash Kudal","author_url":"https:\/\/valeurbit.com\/blog\/author\/yash\/","title":"Methods To Bypass CSRF Protection in Web Applications | ValeurBit Infosec","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"8p0CGJJT3l\"><a href=\"https:\/\/valeurbit.com\/blog\/methods-to-bypass-csrf-protection-in-web-applications\/\">Methods To Bypass CSRF Protection in Web Applications<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/valeurbit.com\/blog\/methods-to-bypass-csrf-protection-in-web-applications\/embed\/#?secret=8p0CGJJT3l\" width=\"600\" height=\"338\" title=\"&#8220;Methods To Bypass CSRF Protection in Web Applications&#8221; &#8212; ValeurBit Infosec\" data-secret=\"8p0CGJJT3l\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"What is CSRF? Cross site request forgery is a web application vulnerability in which the attacker instigates the victim to perform actions which are not intended to perform. The impact of such vulnerability can be very critical as the attacker could be able to change the email or password of the account or even make..."}