Intrusion Prevention



This indicates an attack attempt to exploit a Command Execution vulnerability in Usermin.
The vulnerability is caused by a lack of sanitizing of the "sig_file_free" parameter that is passed to "uconfig_save.cgi". A remote attacker may be able to exploit this to execute arbitrary commands within the context of the application, via a crafted request.

Affected Products

Usermin 0.980-1.650


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Upgrade to the latest version available from the website.

CVE References