CVE-2026-44331

NameCVE-2026-44331
DescriptionIn ProFTPD through 1.3.9a before 7666224, a SQL injection vulnerability in sqltab_fetch_clients_cb() in contrib/mod_wrap2_sql.c allows a remote attacker to inject arbitrary SQL commands via a crafted domain name that is accessed in a reverse DNS lookup. When "UseReverseDNS on" is enabled, the attacker-supplied hostname is passed unescaped into SQL queries. The character restrictions of DNS names may affect exploitability.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1135840

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
proftpd-dfsg (PTS)bullseye1.3.7a+dfsg-12+deb11u2vulnerable
bullseye (security)1.3.7a+dfsg-12+deb11u5vulnerable
bookworm, bookworm (security)1.3.8+dfsg-4+deb12u4vulnerable
trixie1.3.8.c+dfsg-4+deb13u1vulnerable
forky1.3.9~dfsg-5vulnerable
sid1.3.9a~dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
proftpd-dfsgsource(unstable)1.3.9a~dfsg-11135840

Notes

https://github.com/proftpd/proftpd/issues/2057
https://github.com/proftpd/proftpd/commit/766622456440fbca33abd7927c523673a11d1ed1

Search for package or bug name: Reporting problems