ZeroPathAI

POCs to demonstrate CVE-2026-42167 in ProFTPD

18
4
100% credibility
Found May 02, 2026 at 18 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

Proof-of-concept demonstrations and local test environment for a SQL injection vulnerability in ProFTPD's logging system that allows unauthenticated attackers to inject backdoor users or achieve remote code execution.

How It Works

1
🔍 Discover the FTP flaw demos

You hear about a weakness in FTP server software and find this kit of safe test examples to see it in action.

2
📥 Grab the test files

You download the project to your computer to run the demonstrations yourself.

3
⚙️ Prepare your safe playground

You follow the simple guide to set up a pretend vulnerable server just for testing on your machine.

4
▶️ Launch the demo server

With an easy start command, your local test environment comes alive and is ready to go.

5
💥 Try the sneaky attack tricks

You run the example tests that reveal how outsiders can slip in backdoors or run secret commands, watching it happen right there.

6
🧹 Shut it all down

You cleanly stop the test setup, leaving your computer just as it was.

🛡️ Master the risk

Now you fully grasp the danger and know exactly how to shield your real file servers from this kind of trouble.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 18 to 18 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is proftpd-CVE-2026-42167-poc?

This GitHub repo delivers Python PoCs to demonstrate CVE-2026-42167, a SQL injection flaw in ProFTPD's mod_sql logging that lets unauthenticated attackers inject backdoor users or trigger RCE on PostgreSQL backends. You get five standalone scripts for pre-auth and post-auth exploits—backdoor creation via stacked queries, RCE through COPY TO PROGRAM, and time-based blind data dumps—plus Docker Compose setup to spin up a vulnerable ProFTPD + Postgres environment in minutes. It solves the hassle of manually building and verifying ProFTPD CVEs, focusing on PostgreSQL but noting tweaks for MySQL/SQLite.

Why is it gaining traction?

Unlike scattered CVE writeups, these PoCs are self-contained Python scripts using only the standard library—no deps beyond Docker and uv—running exploits via simple CLI flags like `--host` and `--port`. The automated setup scripts clone, build, and seed a pinned vulnerable ProFTPD instance, printing ready-to-paste commands, making reproduction dead simple for CVE-2026-42167 demos. Low barrier hooks security folks scanning GitHub for ProFTPD pocs.

Who should use this?

ProFTPD admins auditing SQL-backed deployments for SQLLog misconfigs. Pentesters validating CVE-2026-42167 in client environments. Security researchers reproducing the is_escaped_text bypass for reports or talks on FTP server vulns.

Verdict

Grab it if you're testing ProFTPD—docs are thorough, setup is polished, but with 18 stars and 1.0% credibility score, it's early-stage; verify exploits in your context before demos. Solid for targeted CVE work, skip for general tools.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.