CVE-2009-0543

ProFTPD Server <1.3.1 - Auth Bypass

Title source: llm
STIX 2.1

Description

ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.

Exploits (1)

exploitdb WRITEUP VERIFIED
by gat3way · textremotemultiple
https://www.exploit-db.com/exploits/8037

References (7)

Core 7
Core References
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2009/dsa-1730
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/02/11/5
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/34268
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2009:061
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200903-27.xml
Mailing List mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/02/11/4
Various Sources x_refsource_confirm
http://bugs.proftpd.org/show_bug.cgi?id=3173

Scores

EPSS 0.0037
EPSS Percentile 59.0%

Details

CWE
CWE-89
Status published
Products (1)
proftpd/proftpd 1.3.1
Published Feb 12, 2009
Tracked Since Feb 18, 2026