Intrusion Prevention

Usermin.Email.Signature.File.Configuration.Command.Execution

Description

This indicates an attack attempt to exploit a Command Execution vulnerability in Usermin.
The vulnerability is caused by a lack of sanitizing of the "sig_file_free" parameter that is passed to "uconfig_save.cgi". A remote attacker may be able to exploit this to execute arbitrary commands within the context of the application, via a crafted request.

Affected Products

Usermin 0.980-1.650

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Upgrade to the latest version available from the website.
http://www.webmin.com/download.html

CVE References

CVE-2015-2079