[原文]PHP file inclusion vulnerability in includes/edit_new.php in Pivot 1.30 RC2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a FTP URL or full file path in the Paths[extensions_path] parameter.
Pivot contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to edit_new.php not properly sanitizing user input supplied to the 'Paths[extensions_path]' variable. This may allow an attacker to include a file from the local host or a remote host that contains arbitrary commands which will be executed by the vulnerable script.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.