, , , , , , .
, XSRF, ; XSRF, , . <img> :
<img src="http://my-bank-website.com/withdraw_money.php?amount=100000&account=mandy-the-hacker" />
, , , , 100 000 mandy-the-hacker, , , -bank-website.com. XSRF.
The only way to prevent this is to force users to upload images, rather than providing URLs for them. However, an attacker can still provide a link to the XSRF vulnerability, so removing the URL submission feature doesn't really help; you don’t harm another site by allowing tags <img>, they will harm yourself without using user-specific tokens in forms .
source
share