The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution.
VMware vCenter Chargeback Manager prior to version 2.5.1
a. vCenter Chargeback Manager Remote Code Execution
The vCenter Chargeback Manager (CBM) contains a flaw in its handling of file uploads. Exploitation of this issue may allow an unauthenticated attacker to execute code remotely.
VMware would like to thank Andrea Micalizzi, aka rgod, for reporting this issue to us through HP's Zero Day Initiative (ZDI).
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2013-3520 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware vCenter Chargeback Manager
------------------------------------------------------
Download link:
https://downloads.vmware.com/d/info/it_business_management/vmware_vcenter_chargeback/2_5
Release Notes:
https://www.vmware.com/support/vcbm/doc/vcbm_2_5_1_release_notes.html
2013-06-11 VMSA-2013-0008
Initial security advisory in conjunction with the release of CBM 2.5.1 on 2013-06-11.
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists: