{"id":"CVE-2009-0542","details":"SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a \"%\" (percent) character in the username, which introduces a \"'\" (single quote) character during variable substitution by mod_sql.","modified":"2026-01-27T04:09:36.804947Z","published":"2009-02-12T16:30:00Z","withdrawn":"2026-01-27T04:09:36.804947Z","related":["openSUSE-SU-2024:10048-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/34268"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200903-27.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2009/dsa-1730"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"},{"type":"WEB","url":"http://bugs.proftpd.org/show_bug.cgi?id=3180"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2009/02/11/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2009/02/11/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2009/02/11/5"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/500823/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/500833/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/500851/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/500852/100/0/threaded"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/8037"}],"schema_version":"1.7.3"}