In this chapter, we covered the basics of Cross-Site Request Forgery (CSRF) as a vulnerability, created and validated a CSRF PoC, created a CSRF PoC programmatically, and successfully documented the vulnerability for a bug-report submission. Hopefully, you've also come away with a sense of why the bug can be so severe, and a few attack scenarios you can use for a future impact report.





















































