[原文]PHP remote file include vulnerability in admin/index.php in Archangel Weblog 0.90.02 allows remote authenticated administrators to execute arbitrary PHP code via a URL ending in a NULL (%00) in the index parameter.
Archangel Weblog /admin/index.php index Parameter Remote File Inclusion
Remote / Network Access
Loss of Integrity
Archangel Weblog contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to /admin/index.php not properly sanitizing user input supplied to the 'index' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.