This exercise details the exploitation of a Cross-Site Request Forgery to gain access to sensitive data