header-logo
Suggest Exploit
vendor:
Service Studio
by:
Carlo Di Dato for Deloitte Risk Advisory Italia
7.8
CVSS
HIGH
DLL Hijacking
CWE
Product Name: Service Studio
Affected Version From: Up to 11.53.30 (Build 61739)
Affected Version To:
Patch Exists: Unknown
Related CWE: CVE-2022-47636
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows
2023

OutSystems Service Studio 11.53.30 – DLL Hijacking

A DLL hijacking vulnerability has been discovered in OutSystems Service Studio 11 11.53.30 build 61739. When a user open a .oml file (OutSystems Modeling Language), the application will load the following DLLs from the same directory: av_libGLESv2.dll, libcef.DLL, user32.dll, d3d10warp.dll. Using a crafted DLL, it is possible to execute arbitrary code in the context of the current logged in user.

Mitigation:

Source

Exploit-DB raw data:

# Exploit Title: OutSystems Service Studio 11.53.30 - DLL Hijacking
# Date: 2023-08-09
# Exploit Author: Carlo Di Dato for Deloitte Risk Advisory Italia
# Vendor Homepage: https://www.outsystems.com/
# Version: Up to 11.53.30 (Build 61739)
# Tested on: Windows
# CVE : CVE-2022-47636

A DLL hijacking vulnerability has been discovered in OutSystems Service 
Studio 11 11.53.30 build 61739.
When a user open a .oml file (OutSystems Modeling Language), the 
application will load the following DLLs from the same directory:

av_libGLESv2.dll
libcef.DLL
user32.dll
d3d10warp.dll

Using a crafted DLL, it is possible to execute arbitrary code in the 
context of the current logged in user.