<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Csrf on Devops Monk</title><link>https://devops-monk.com/tags/csrf/</link><description>Recent content in Csrf on Devops Monk</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 04 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://devops-monk.com/tags/csrf/index.xml" rel="self" type="application/rss+xml"/><item><title>CSRF Protection: How It Works and When to Disable It</title><link>https://devops-monk.com/tutorials/spring-security/csrf-protection/</link><pubDate>Mon, 04 May 2026 00:00:00 +0000</pubDate><guid>https://devops-monk.com/tutorials/spring-security/csrf-protection/</guid><description>What Is a CSRF Attack? Cross-Site Request Forgery (CSRF) tricks an authenticated user&amp;rsquo;s browser into making an unintended request to your application.
The attack:
Alice is logged into bank.com — her browser holds a valid session cookie Alice visits evil.com evil.com contains &amp;lt;img src=&amp;quot;https://bank.com/transfer?to=attacker&amp;amp;amount=5000&amp;quot;&amp;gt; Alice&amp;rsquo;s browser fires the request, automatically attaching her bank.com session cookie bank.com receives an authenticated request that Alice never intended to make The attack works because browsers automatically send cookies with cross-origin requests.</description></item></channel></rss>