First, we have to know the definition so let's read the description and the risk factors of the vulnerability in the OWASP guide: here.
Now let's do a cool exercise that we can find here. You'll get a different explanation so you can supplement your notes and do a practical exercise.
HACKSPLAINING is a cool site that has very cool examples and exercises so make sure to give a try.
It also has a book that you can find here, which we recommend.
To finish the learning section we are going to read and try to understand this guide from Raj Chandel's Blog, it's a really good guide and we are going to learn a lot from here.
For your information, this a great blog you can find a lot of articles and write ups.
You can find the blog here.
Here is the guide.
You now know:
The vulnerability seems to be very easy to exploit, but there are still many alternatives.