Applications must protect all state-changing actions against cross-site request forgery (XSRF). In this attack, a malicious user forces the victim to send a request to the application, for example by luring the user to a page under the attacker's control. Because the browser automatically attaches available authentication cookies, the request will appear to be authorized if the user is logged in to the application.
For example, consider an online banking application that allows users to transfer money to another account. The URL for transfers might look something like this:
https://www.example.com/bank-transfer.html?dest_account=123456&amount=99.90&submit=true
If an attacker manages to lure the victim to a malicious site, the site could include HTML that causes such a request to be sent:
<img src="https://www.example.com/bank-transfer.html?dest_account=666&amount=99.90& submit=true">
If the user is logged in to the online banking portal, the application will receive that request and check for authentication cookies — which will be present, since the request was sent from the authorized user's browser.