# Exploit Title: Rockwell Automation Allen-Bradley PowerMonitor 1000 - Cross-Site Scripting # Date: 2018-11-27 # Exploit Author: Luca.Chiou # Vendor Homepage: https://www.rockwellautomation.com/ # Version: 1408-EM3A-ENT B # Tested on: It is a proprietary devices: https://ab.rockwellautomation.com/zh/Energy-Monitoring/1408-PowerMonitor-1000 # CVE : N/A # 1. Description: # In Rockwell Automation Allen-Bradley PowerMonitor 1000 web page, # user can add a new user by access the /Security/Security.shtm. # When users add a new user, the new useras account will in the post data. # Attackers can inject malicious XSS code in useras account parameter of post data. # The useras account parameter will be stored in database, so that cause a stored XSS vulnerability. # 2. Proof of Concept: # Browse http:///Security/Security.shtm # In page Security.shtm, add a new user # Send this post data: /Security/cgi-bin/security|0|0|