{"schema_version":"1.7.2","id":"OESA-2026-2267","modified":"2026-05-09T12:33:37Z","published":"2026-05-09T12:33:37Z","upstream":["CVE-2026-44331"],"summary":"proftpd security update","details":"ProFTPD is an enhanced FTP server with a focus toward simplicity, security, and ease of configuration. It features a very Apache-like configuration syntax, and a highly customizable server infrastructure, including support for multiple &amp;apos;virtual&amp;apos; FTP servers, anonymous FTP, and permission-based directory visibility. This package defaults to the standalone behavior of ProFTPD, but all the needed scripts to have it run by systemd instead are included.\r\n\r\nSecurity Fix(es):\n\nIn ProFTPD through 1.3.9a before 7666224, a SQL injection vulnerability in sqltab_fetch_clients_cb() in contrib/mod_wrap2_sql.c allows a remote attacker to inject arbitrary SQL commands via a crafted domain name that is accessed in a reverse DNS lookup. When &quot;UseReverseDNS on&quot; is enabled, the attacker-supplied hostname is passed unescaped into SQL queries. The character restrictions of DNS names may affect exploitability.(CVE-2026-44331)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"proftpd","purl":"pkg:rpm/openEuler/proftpd&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.9a-2.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["proftpd-1.3.9a-2.oe2403sp3.aarch64.rpm","proftpd-debuginfo-1.3.9a-2.oe2403sp3.aarch64.rpm","proftpd-debugsource-1.3.9a-2.oe2403sp3.aarch64.rpm","proftpd-devel-1.3.9a-2.oe2403sp3.aarch64.rpm","proftpd-ldap-1.3.9a-2.oe2403sp3.aarch64.rpm","proftpd-mysql-1.3.9a-2.oe2403sp3.aarch64.rpm","proftpd-postgresql-1.3.9a-2.oe2403sp3.aarch64.rpm","proftpd-proxy-1.3.9a-2.oe2403sp3.aarch64.rpm","proftpd-sqlite-1.3.9a-2.oe2403sp3.aarch64.rpm","proftpd-utils-1.3.9a-2.oe2403sp3.aarch64.rpm"],"src":["proftpd-1.3.9a-2.oe2403sp3.src.rpm"],"x86_64":["proftpd-1.3.9a-2.oe2403sp3.x86_64.rpm","proftpd-debuginfo-1.3.9a-2.oe2403sp3.x86_64.rpm","proftpd-debugsource-1.3.9a-2.oe2403sp3.x86_64.rpm","proftpd-devel-1.3.9a-2.oe2403sp3.x86_64.rpm","proftpd-ldap-1.3.9a-2.oe2403sp3.x86_64.rpm","proftpd-mysql-1.3.9a-2.oe2403sp3.x86_64.rpm","proftpd-postgresql-1.3.9a-2.oe2403sp3.x86_64.rpm","proftpd-proxy-1.3.9a-2.oe2403sp3.x86_64.rpm","proftpd-sqlite-1.3.9a-2.oe2403sp3.x86_64.rpm","proftpd-utils-1.3.9a-2.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2267"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-44331"}],"database_specific":{"severity":"High"}}
