OWASP Top 10 Vulnerabilities: #8 Cross-Site Request Forgery

This 4 minute video by IBM’s ethical hacking team outlines how cross-site request forgery is exploited by forcing web application users to perform actions without their consent.  Approximately 23% of all web applications are vulnerable to this OWASP #8 coding vulnerability. It explains how to prevent these attacks by preventing requests originating from non-local servers or without a unique token tied to a user session. Finally, it shows how IBM’s AppScan tool can identify these flaws within an application for remediation.

Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure.