[原文]PHP remote file inclusion vulnerability in includes/webdav/server.php in Bytehoard 2.1 Epsilon/Delta allows remote attackers to execute arbitrary PHP code via a URL in the bhconfig[bhfilepath] parameter.
ByteHoard contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to server.php not properly sanitizing user input supplied to the 'bhconfig[bhfilepath]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.