This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Category:OWASP CSRFTester Project

Jump to: navigation, search

OWASP Inactive Banner.jpg
OWASP Project Header.jpg

OWASP CSRFTester Project

OWASP CSRFTester Project is...


Write a short introduction


Just when developers are starting to run in circles over Cross Site Scripting, the 'sleeping giant' awakes for yet another web-catastrophe. Cross-Site Request Forgery (CSRF) is an attack whereby the victim is tricked into loading information from or submitting information to a web application for which they are currently authenticated. The problem is that the web application has no means of verifying the integrity of the request. The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.


You can access the source code at:

Usage Instructions

Click here for documentation regarding the use of the CSRFTester.


OWASP CSRTester Project is free to use. CSRFTester is offered under the LGPL. For further information on OWASP licenses, please consult the OWASP Licenses page.

Project Sponsors

The OWASP CSRFTester project is sponsored by Aspect_logo_owasp.jpg       

What is CSRFTester?

OWASP CSRFTester provides:

  • xxx
  • xxx


Project Leader

Eric Sheridan

Related Projects

  • Check out the OWASP CSRF Guard project page for a number of CSRF defense mechanisms written in different languages.


Quick Download

  • Click here to download the latest OWASP CSRFTester 1.0 binary and startup script.
  • Click here to download the latest OWASP CSRFTester 1.0 source and binary.
  • Click here to download the author's presentation at the 2007 OWASP conference in San Jose about the dangers of CSRF and a brief description of both CSRF Guard and CSRF Tester.

Email List

Sign Up

News and Events

  • [20 Nov 2013] News 2
  • [30 Sep 2013] News 1

In Print


Midlevel projects.png Owasp-builders-small.png
Project Type Files CODE.jpg


CSRFTester is developed by a worldwide team of volunteers. The primary contributors to date have been:

  • xxx
  • xxx


  • xxx
  • xxx

As of July, the priorities are:


The purpose of this article is to maintain the desired change requests for the upcoming CSRFTester releases. If there is a particular feature that you would like to see implemented, please feel free to add it to the appropriate sections below.

Planned Changes

The following is a list of changes that are tentatively scheduled for the CSRFTester 1.2 release:

  1. Rebuild the project in NetBeans and create jUnit test cases where applicable
  2. Fix an off-by-one bug as noted by Jason Axley
  3. Handle ASP.NET pages that have an input type with the name submit as noted by Jason Axley

Deferred Changes

The following is a list of changes that were suggested but not implemented:


Changes Under Consideration

The following is a list of change requests that are still under consideration:

  1. Port CSRFTester as a WebScarab plugin

Involvement in the development and promotion of CSRFTester is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • xxx
  • xxx

What does this OWASP project offer you?
What releases are available for this project?
what is this project?
Name: OWASP CSRFTester Project
Purpose: The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.
License: GNU Library or Lesser General Public License (LGPL)
who is working on this project?
Project Leader(s):
  • Eric Sheridan @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: [[email protected] Mailing List Archives]
Project Roadmap: Not Yet Created
Key Contacts
  • Contact Eric Sheridan @ to contribute to this project
  • Contact Eric Sheridan @ to review or sponsor this project
current release
Not Yet Published
last reviewed release
Not Yet Reviewed

other releases

This category currently contains no pages or media.