Energy 
The Pitfalls of Cross-Site Request Forgery
Web Application Pentesting
Two web applications were tested for a company in the energy sector. The focus was on attack options for internal and external accounts within the web applications.
Several cross-site request forgery vulnerabilities were identified during the test within the web applications. With CSRF attacks, commands can be executed in the context of the victim if the victim clicks on a manipulated link. This allows a CSRF attack to change an account password on both internal and external registered users. If successful, this would result in the victim's account being completely compromised.
To prevent CSRF attacks, it must be impossible to prepare a valid request to the web application in advance. This is usually ensured with a random value that changes with every call and is validated on the server side with every received request.
