[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-8805?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14736646#comment-14736646
 ] 

ASF GitHub Bot commented on CLOUDSTACK-8805:
--------------------------------------------

Github user rafaelweingartner commented on the pull request:

    https://github.com/apache/cloudstack/pull/775#issuecomment-138872339
  
    @nitin-maharana, when I said that the String concatenation there might make 
ACS vulnerable to SQL injection attacks, I did not mean that your PR did that. 
What I meant was that the code that is there, even before your PR, is making 
ACs vulnerable.
    
    I just mentioned about the vulnerability here to register the thought, so 
others can also think about the problem that might exist.
    
    I do not know much of ACS DAOs, but if in other places such as VM API (in 
which users have access), the same String concatenations are used that can be a 
huge problem.
    Besides that the code LGTM.



> Domains become inactive automatically.
> --------------------------------------
>
>                 Key: CLOUDSTACK-8805
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-8805
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the 
> default.) 
>            Reporter: Nitin Kumar Maharana
>
> If there is a domain with name '%', if we force delete the '%' domain then 
> all the other domains become inactive except Root domain.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to