A new feature of version 4.5 of TYPO3 is protection against CSRF. In the best case, you will not realize that this feature exists…
CSRF can be used to execute certain commands without having the required privileges. It is sufficient if the attacked person has the rights and clicks on a particular link. It actually works quite simple: For example, the command (or link) domain.com/delete.php?id=123 is meant to delete a database-record with the ID 123. Since the attacker does not have sufficient rights to carry out this operation, he needs to trick the right person to click on a link, which includes the command. Some examples how to do this:
- A link in an email, like this <a href="domain.com/delete.php?id=123">Photos of my new girlfriend</a>
- A hacked page where the link is loaded automatically in the background via JavaScript