2022-05-06 18:10:29
HCL
PUBLISHED
This vulnerability arises because the application allows the user to perform some sensitive action without verifying that the request was sent intentionally. An attacker can cause a victims browser to emit an HTTP request to an arbitrary URL in the application.