header-logo
Suggest Exploit
vendor:
PowerMonitor 1000
by:
Luca.Chiou
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: PowerMonitor 1000
Affected Version From: 1408-EM3A-ENT B
Affected Version To: 1408-EM3A-ENT B
Patch Exists: YES
Related CWE: N/A
CPE: h:rockwell_automation:powermonitor_1000
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Proprietary devices
2018

Rockwell Automation Allen-Bradley PowerMonitor 1000 – Cross-Site Scripting

In Rockwell Automation Allen-Bradley PowerMonitor 1000 web page, user can add a new user by access the /Security/Security.shtm. When users add a new user, the new user’s account will in the post data. Attackers can inject malicious XSS code in user’s account parameter of post data. The user’s account parameter will be stored in database, so that cause a stored XSS vulnerability.

Mitigation:

Update to the latest version
Source

Exploit-DB raw data:

# Exploit Title: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Cross-Site Scripting
# Date: 2018-11-27
# Exploit Author: Luca.Chiou
# Vendor Homepage: https://www.rockwellautomation.com/
# Version: 1408-EM3A-ENT B
# Tested on: It is a proprietary devices: https://ab.rockwellautomation.com/zh/Energy-Monitoring/1408-PowerMonitor-1000
# CVE : N/A

# 1. Description:
# In Rockwell Automation Allen-Bradley PowerMonitor 1000 web page,
# user can add a new user by access the /Security/Security.shtm.
# When users add a new user, the new user’s account will in the post data.
# Attackers can inject malicious XSS code in user’s account parameter of post data.
# The user’s account parameter will be stored in database, so that cause a stored XSS vulnerability.

# 2. Proof of Concept:
# Browse http://<Your Modem IP>/Security/Security.shtm
# In page Security.shtm, add a new user
# Send this post data:

/Security/cgi-bin/security|0|0|<script>alert(123)</script>