{"schema_version":"1.7.2","id":"OESA-2026-2159","modified":"2026-05-03T09:56:44Z","published":"2026-05-03T09:56:44Z","upstream":["CVE-2026-42167"],"summary":"proftpd security update","details":"ProFTPD is an enhanced FTP server with a focus toward simplicity, security, and ease of configuration. It features a very Apache-like configuration syntax, and a highly customizable server infrastructure, including support for multiple &amp;apos;virtual&amp;apos; FTP servers, anonymous FTP, and permission-based directory visibility. This package defaults to the standalone behavior of ProFTPD, but all the needed scripts to have it run by systemd instead are included.\r\n\r\nSecurity Fix(es):\n\nmod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).(CVE-2026-42167)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"proftpd","purl":"pkg:rpm/openEuler/proftpd&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.9a-1.oe2403"}]}],"ecosystem_specific":{"aarch64":["proftpd-1.3.9a-1.oe2403.aarch64.rpm","proftpd-debuginfo-1.3.9a-1.oe2403.aarch64.rpm","proftpd-debugsource-1.3.9a-1.oe2403.aarch64.rpm","proftpd-devel-1.3.9a-1.oe2403.aarch64.rpm","proftpd-ldap-1.3.9a-1.oe2403.aarch64.rpm","proftpd-mysql-1.3.9a-1.oe2403.aarch64.rpm","proftpd-postgresql-1.3.9a-1.oe2403.aarch64.rpm","proftpd-proxy-1.3.9a-1.oe2403.aarch64.rpm","proftpd-sqlite-1.3.9a-1.oe2403.aarch64.rpm","proftpd-utils-1.3.9a-1.oe2403.aarch64.rpm"],"src":["proftpd-1.3.9a-1.oe2403.src.rpm"],"x86_64":["proftpd-1.3.9a-1.oe2403.x86_64.rpm","proftpd-debuginfo-1.3.9a-1.oe2403.x86_64.rpm","proftpd-debugsource-1.3.9a-1.oe2403.x86_64.rpm","proftpd-devel-1.3.9a-1.oe2403.x86_64.rpm","proftpd-ldap-1.3.9a-1.oe2403.x86_64.rpm","proftpd-mysql-1.3.9a-1.oe2403.x86_64.rpm","proftpd-postgresql-1.3.9a-1.oe2403.x86_64.rpm","proftpd-proxy-1.3.9a-1.oe2403.x86_64.rpm","proftpd-sqlite-1.3.9a-1.oe2403.x86_64.rpm","proftpd-utils-1.3.9a-1.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2159"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42167"}],"database_specific":{"severity":"High"}}
