DEBIAN-CVE-2026-42167

Source
https://security-tracker.debian.org/tracker/CVE-2026-42167
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42167.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-42167
Upstream
  • CVE-2026-42167
Published
2026-04-28T23:16:20.610Z
Modified
2026-05-16T14:04:27.916788Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

mod_sql in ProFTPD before 1.3.9a allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).

References

Affected packages

Debian:11 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.3.7a+dfsg-12
1.3.7a+dfsg-12+deb11u1
1.3.7a+dfsg-12+deb11u2
1.3.7a+dfsg-12+deb11u3
1.3.7a+dfsg-12+deb11u5
1.3.7b+dfsg-1
1.3.7b+dfsg-2
1.3.7c+dfsg-1
1.3.7d+dfsg-1
1.3.7d+dfsg-2
1.3.7d+dfsg-3
1.3.8+dfsg-1
1.3.8+dfsg-2
1.3.8+dfsg-3
1.3.8+dfsg-4
1.3.8+dfsg-5
1.3.8+dfsg-6
1.3.8+dfsg-7
1.3.8+dfsg-8
1.3.8.a+dfsg-1
1.3.8.b+dfsg-1
1.3.8.b+dfsg-2
1.3.8.b+dfsg-3
1.3.8.b+dfsg-4
1.3.8.c+dfsg-1
1.3.8.c+dfsg-2
1.3.8.c+dfsg-3
1.3.8.c+dfsg-4
1.3.9~dfsg-1
1.3.9~dfsg-2
1.3.9~dfsg-3
1.3.9~dfsg-4
1.3.9~dfsg-5
1.3.9a~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42167.json"

Debian:12 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.8+dfsg-4+deb12u5

Affected versions

1.*
1.3.8+dfsg-4
1.3.8+dfsg-4+deb12u1
1.3.8+dfsg-4+deb12u2
1.3.8+dfsg-4+deb12u3
1.3.8+dfsg-4+deb12u4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42167.json"

Debian:13 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.8.c+dfsg-4+deb13u2

Affected versions

1.*
1.3.8.c+dfsg-4
1.3.8.c+dfsg-4+deb13u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42167.json"

Debian:14 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.9~dfsg-5

Affected versions

1.*
1.3.8.c+dfsg-4
1.3.9~dfsg-1
1.3.9~dfsg-2
1.3.9~dfsg-3
1.3.9~dfsg-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-42167.json"