Sign up for Security

Enter your email address:


VMware vCenter Chargeback Manager Remote Code Execution

VMware Security Advisory
Advisory ID: VMSA-2013-0008
Synopsis: VMware vCenter Chargeback Manager Remote Code Execution
Issue date: 2013-06-11
Updated on: 2013-06-11 (initial advisory)
CVE numbers: CVE-2013-3520
1. Summary

 The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution.
2. Relevant Releases

VMware vCenter Chargeback Manager prior to version 2.5.1
3. Problem Description
a. vCenter Chargeback Manager Remote Code Execution

The vCenter Chargeback Manager (CBM) contains a flaw in its handling of file uploads. Exploitation of this issue may allow an unauthenticated attacker to execute code remotely.

VMware would like to thank Andrea Micalizzi, aka rgod, for reporting this issue to us through HP's Zero Day Initiative (ZDI).

The Common Vulnerabilities and Exposures project ( has assigned the name CVE-2013-3520 to this issue.

Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product Running Replace with /
Product Version on Apply Patch
CBM 2.01 any CBM 2.5.1
CBM 2.5 any
CBM 2.5.1
4. Solution

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware vCenter Chargeback Manager

Download link:

Release Notes:
6. Change log

2013-06-11 VMSA-2013-0008
Initial security advisory in conjunction with the release of CBM 2.5.1 on 2013-06-11.
7. Contact

E-mail list for product security notifications and announcements:

This Security Advisory is posted to the following lists:

  • security-announce at
  • bugtraq at
  • full-disclosure at
E-mail: security at
PGP key at:

VMware Security Advisories

VMware security response policy

General support life cycle policy

VMware Infrastructure support life cycle policy

Copyright 2013 VMware Inc. All rights reserved.