
6 changes to exploits/shellcodes/ghdb TP-Link Archer AX21 - Unauthenticated Command Injection systemd 246 - Local Privilege Escalation Maltrail v0.53 - Unauthenticated Remote Code Execution (RCE) Request-Baskets v1.2.1 - Server-side request forgery (SSRF) OutSystems Service Studio 11.53.30 - DLL Hijacking
20 lines
No EOL
682 B
Text
20 lines
No EOL
682 B
Text
# Exploit Title: OutSystems Service Studio 11.53.30 - DLL Hijacking
|
|
# Date: 2023-08-09
|
|
# Exploit Author: Carlo Di Dato for Deloitte Risk Advisory Italia
|
|
# Vendor Homepage: https://www.outsystems.com/
|
|
# Version: Up to 11.53.30 (Build 61739)
|
|
# Tested on: Windows
|
|
# CVE : CVE-2022-47636
|
|
|
|
A DLL hijacking vulnerability has been discovered in OutSystems Service
|
|
Studio 11 11.53.30 build 61739.
|
|
When a user open a .oml file (OutSystems Modeling Language), the
|
|
application will load the following DLLs from the same directory:
|
|
|
|
av_libGLESv2.dll
|
|
libcef.DLL
|
|
user32.dll
|
|
d3d10warp.dll
|
|
|
|
Using a crafted DLL, it is possible to execute arbitrary code in the
|
|
context of the current logged in user. |