Awesome question! I had to scratch my head a bit.
How about a scenario where an attacker has already acquired the victimβs password in other ways, but does not have access to the site itself? He tricks his victim on www.evil.com and has this on the homepage:
<image src="http://portal.internal/login.php?user=root&password=hunter2"/>
This convinces the victim browser to authenticate the victim on the site. Then, on another page of www.evil.com, there is another image tag:
<image src="http://portal.internal/deleteEverything.php/>
In this case, the attacker must use CSRF to access the internal site, since he has no other access to it. Also note that this CSRF attack should not be performed for a user who actually has an account in the system, only a user who has network access to the site.
source share