
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site request forgery (CSRF) vulnerability was discovered in DomainMod version 4.13, specifically affecting the /admin/maintenance/ path. This vulnerability allows attackers to arbitrarily delete logs without authentication. The vulnerability was assigned CVE-2020-20989 and was publicly disclosed with a CVSS v3.1 base score of 4.3 (MEDIUM) (NVD).
The vulnerability exists in the maintenance functionality of DomainMod's admin interface. It allows unauthenticated attackers to perform unauthorized actions through CSRF attacks. The CVSS v3.1 vector string is CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N, indicating network accessibility, low attack complexity, no privileges required, user interaction required, unchanged scope, and low impact on integrity (NVD).
If successfully exploited, the vulnerability allows attackers to delete log files from the system without authorization. This could result in the loss of important audit trails and system activity records, potentially hiding malicious activities or causing operational issues (NVD, MyCVE Blog).
The vulnerability affects DomainMod version 4.13. Users should upgrade to a patched version if available. General CSRF protection measures such as implementing anti-CSRF tokens and validating request origins should be applied (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."