An example of a hardened request:
POST /ChangeEmail HTTP/1.1
Host: MySafeWebSite.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
XSRF-Secret: 60bUJWfjie6196f08NYRfj8f43896f3cab50833896f3caASpd28
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: MySafeWebSite.com
Cookie: Your Cookie Here; Secure; HttpOnly
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
[email protected]&OldPassword=TheOldPassword
4. Cross Site Request Forgery AKA CSRF
Cookies are protected against XSS
and MITM Attacks
The application is always checking
for the origin.
XSRF-Secret value as a request
header, Hard to be guessed
and non reusable.
Additional Protection mechanism.
Request is server via POST method
and protected with SSL/HTTPS