VMware vCenter Chargeback Manager Remote Code Execution
VMware Security Advisory
The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution.
2. Relevant Releases
VMware vCenter Chargeback Manager prior to version 2.5.1
3. Problem Description
a. vCenter Chargeback Manager Remote Code Execution
The vCenter Chargeback Manager (CBM) contains a flaw in its handling of file uploads. Exploitation of this issue may allow an unauthenticated attacker to execute code remotely.
VMware would like to thank Andrea Micalizzi, aka rgod, for reporting this issue to us through HP's Zero Day Initiative (ZDI).
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2013-3520 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
Replace with / Apply Patch
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware vCenter Chargeback Manager
6. Change log
Initial security advisory in conjunction with the release of CBM 2.5.1 on 2013-06-11.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
VMware security response policy
General support life cycle policy
VMware Infrastructure support life cycle policy
Copyright 2013 VMware Inc. All rights reserved.