This document discusses how an attacker can bypass CSRF protection on a website by abusing the window.opener property in JavaScript. The website checked if window.opener was null to detect CSRF attacks and log the user out. However, the attacker can set window.opener by opening another page from a link on the first page. This allows submitting a CSRF request without being logged out. The attacker created a page with a link that, when clicked, opened a second page containing a CSRF form post. By setting window.opener, the CSRF request was able to bypass the protection. In conclusion, solely client-side security checks can still be bypassed and it is important how such techniques are implemented.