I got a critical vulnerability issue with that file.
Mailnews.cgi fails to check remote user-supplied input for shell metacharacters. A remote attacker can insert a new user to the mailnews’ user file which includes malicious shell commands in the username field. Upon displaying this data, the embedded commands will execute with the privileges of the web server process.
what is the implication of deleting this file?
what is this file for?