Dolibarr ERP/CRM 3.1.0 - '/user/info.php?id' SQL Injection

Author: High-Tech Bridge SA
type: webapps
platform: php
port: 
date_added: 2011-11-23  
date_updated: 2018-07-13  
verified: 1  
codes: CVE-2011-4802;OSVDB-77341  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 36332.txt  
source: https://www.securityfocus.com/bid/50777/info

Dolibarr is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Dolibarr 3.1.0 RC is vulnerable; prior versions may also be affected.

http://www.example.com/user/info.php?id=1 INTO OUTFILE '../../../tmp/example'