First published: Thu Feb 12 2009(Updated: )
SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | =1.3.2 | |
ProFTPD | =1.3.2_rc2 | |
ProFTPD | =1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0542 is classified as a critical severity vulnerability due to its ability to allow remote execution of arbitrary SQL commands.
CVE-2009-0542 affects ProFTPD versions 1.3.1 through 1.3.2rc2.
To fix CVE-2009-0542, you should upgrade to a version of ProFTPD that is newer than 1.3.2rc2, which has the vulnerability patched.
CVE-2009-0542 can be exploited by attackers sending specially crafted usernames containing a '%' character to execute arbitrary SQL commands.
There are no effective workarounds for CVE-2009-0542, so upgrading to a patched version is recommended.