Rapid7 Vulnerability & Exploit Database

Tom Sawyer Software GET Extension Factory Remote Code Execution

Back to Search

Tom Sawyer Software GET Extension Factory Remote Code Execution

Disclosed
05/03/2011
Created
05/30/2018

Description

This module exploits a remote code execution vulnerability in the tsgetx71ex553.dll ActiveX control installed with Tom Sawyer GET Extension Factory due to an incorrect initialization under Internet Explorer. While the Tom Sawyer GET Extension Factory is installed with some versions of VMware Infrastructure Client, this module has been tested only with the versions installed with Embarcadero Technologies ER/Studio XE2 / Embarcadero Studio Portal 1.6. The ActiveX control tested is tsgetx71ex553.dll, version 5.5.3.238. This module achieves DEP and ASLR bypass using the well known msvcr71.dll rop chain. The dll is installed by default with the Embarcadero software, and loaded by the targeted ActiveX.

Author(s)

  • Elazar Broad
  • rgod
  • juan vazquez <juan.vazquez@metasploit.com>

Platform

Windows

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/browser/tom_sawyer_tsgetx71ex552
msf exploit(tom_sawyer_tsgetx71ex552) > show targets
    ...targets...
msf exploit(tom_sawyer_tsgetx71ex552) > set TARGET < target-id >
msf exploit(tom_sawyer_tsgetx71ex552) > show options
    ...show and set options...
msf exploit(tom_sawyer_tsgetx71ex552) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;