OWASP Top Ten Project 2013 No 8 – Cross-Site Request Forgery (CSRF)
In order to counter a CSRF attack, the strategy proven most effective is the synchronizer token pattern. In the absence of an attack it works as follows: Presented with a request from an authorized user, the web application generates a cryptographically