ID
VAR-E-201812-0097
TITLE
Rockwell Automation Allen-Bradley PowerMonitor 1000 XSS
Trust: 0.5
DESCRIPTION
Rockwell Automation Allen-Bradley PowerMonitor 1000 suffers from a cross site scripting vulnerability.
Trust: 0.5
AFFECTED PRODUCTS
vendor: | rockwell | model: | automation allen-bradley powermonitor | scope: | eq | version: | 1000 | Trust: 0.5 |
EXPLOIT
# Exploit Title: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Cross-Site Scripting
# Date: 2018-11-27
# Exploit Author: Luca.Chiou
# Vendor Homepage: https://www.rockwellautomation.com/
# Version: 1408-EM3A-ENT B
# Tested on: It is a proprietary devices: https://ab.rockwellautomation.com/zh/Energy-Monitoring/1408-PowerMonitor-1000
# CVE : N/A
# 1. Description:
# In Rockwell Automation Allen-Bradley PowerMonitor 1000 web page,
# user can add a new user by access the /Security/Security.shtm.
# When users add a new user, the new useras account will in the post data.
# Attackers can inject malicious XSS code in useras account parameter of post data.
# The useras account parameter will be stored in database, so that cause a stored XSS vulnerability.
# 2. Proof of Concept:
# Browse http://<Your Modem IP>/Security/Security.shtm
# In page Security.shtm, add a new user
# Send this post data:
/Security/cgi-bin/security|0|0|<script>alert(123)</script>
Trust: 0.5
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
PRICE
free
Trust: 0.5
TYPE
xss
Trust: 0.5
TAGS
tag: | exploit | Trust: 0.5 |
tag: | xss | Trust: 0.5 |
CREDITS
Luca.Chiou
Trust: 0.5
EXTERNAL IDS
db: | PACKETSTORM | id: | 150600 | Trust: 0.5 |
SOURCES
db: | PACKETSTORM | id: | 150600 |
LAST UPDATE DATE
2022-07-27T09:46:57.586000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 150600 | date: | 2018-12-04T04:40:21 |