Security Advisories & Certifications
Sign up for Security Advisories
VMware Security Resource Center
Stay informed about security issues and considerations for your virtual infrastructure.Visit Security Resource Center
VMware vCenter Chargeback Manager Remote Code Execution
|VMware Security Advisory|
|Synopsis:||VMware vCenter Chargeback Manager Remote Code Execution|
|Updated on:||2013-06-11 (initial advisory)|
The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution.
VMware vCenter Chargeback Manager prior to version 2.5.1
The vCenter Chargeback Manager (CBM) contains a flaw in its handling of file uploads. Exploitation of this issue may allow an unauthenticated attacker to execute code remotely.
VMware would like to thank Andrea Micalizzi, aka rgod, for reporting this issue to us through HP's Zero Day Initiative (ZDI).
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2013-3520 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
|VMware||Product||Running||Replace with /
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware vCenter Chargeback Manager
Initial security advisory in conjunction with the release of CBM 2.5.1 on 2013-06-11.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
VMware security response policy
General support life cycle policy
VMware Infrastructure support life cycle policy
Copyright 2013 VMware Inc. All rights reserved.