ID
VAR-E-201812-0105
EDB ID
45928
TITLE
Rockwell Automation Allen-Bradley PowerMonitor 1000 - Cross-Site Scripting - Hardware webapps Exploit
Trust: 0.6
DESCRIPTION
Rockwell Automation Allen-Bradley PowerMonitor 1000 - Cross-Site Scripting.. webapps exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | rockwell | model: | automation allen-bradley powermonitor | scope: | eq | version: | 1000 | Trust: 1.6 |
EXPLOIT
# Exploit Title: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Cross-Site Scripting
# Date: 2018-11-27
# Exploit Author: Luca.Chiou
# Vendor Homepage: https://www.rockwellautomation.com/
# Version: 1408-EM3A-ENT B
# Tested on: It is a proprietary devices: https://ab.rockwellautomation.com/zh/Energy-Monitoring/1408-PowerMonitor-1000
# CVE : N/A
# 1. Description:
# In Rockwell Automation Allen-Bradley PowerMonitor 1000 web page,
# user can add a new user by access the /Security/Security.shtm.
# When users add a new user, the new user’s account will in the post data.
# Attackers can inject malicious XSS code in user’s account parameter of post data.
# The user’s account parameter will be stored in database, so that cause a stored XSS vulnerability.
# 2. Proof of Concept:
# Browse http://<Your Modem IP>/Security/Security.shtm
# In page Security.shtm, add a new user
# Send this post data:
/Security/cgi-bin/security|0|0|<script>alert(123)</script>
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Cross-Site Scripting
Trust: 1.6
TAGS
tag: | Cross-Site Scripting (XSS) | Trust: 1.0 |
CREDITS
Luca.Chiou
Trust: 0.6
EXTERNAL IDS
db: | EXPLOIT-DB | id: | 45928 | Trust: 1.6 |
db: | EDBNET | id: | 100408 | Trust: 0.6 |
REFERENCES
url: | https://www.exploit-db.com/exploits/45928/ | Trust: 0.6 |
SOURCES
db: | EXPLOIT-DB | id: | 45928 |
db: | EDBNET | id: | 100408 |
LAST UPDATE DATE
2022-07-27T09:49:13.891000+00:00
SOURCES RELEASE DATE
db: | EXPLOIT-DB | id: | 45928 | date: | 2018-12-03T00:00:00 |
db: | EDBNET | id: | 100408 | date: | 2018-12-08T00:00:00 |