EncapsBB contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to "index_header.php" not properly sanitizing user input supplied to the "root" variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script. This vulnerability need to active "register_globals" and "allow_url_fopen" in configuration file "php.ini".
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workarounds:
1.Check if the file exists with the file_exist function.
2.Deactive "register_globals" and "allow_url_fopen" in the "php.ini" configuration file.