A malicious attacker can entice a user to visit a specific URL and
then send emails on context of that user using XSRF.
Parameters - &.rand, clean&.jsrand, acrumb, mcrumb (which are most
likely tokens) are not validated during the request submission, which
causes XSRF to occur. These parameters have been removed in the
following HTML code, but the request still succeeds.
Although a “Message Sent” page is displayed after the POST request is
sent, this can be hidden by making use of an iframe to host the
specified page that was previously making the XSRF request.
Care has to be taken to change the following fields as required for
each subsequent attack, or the attack fails due to invalid data being
jsonEmails & to (both contain the recipient address)
fromAddresses & defFromAddress ( both contain the source address)
Start of PoC.html