Directory traversal vulnerability in action_admin/paysubscriptions.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote authenticated administrators to include and execute arbitrary local PHP files via a .. (dot dot) in the name parameter, preceded by enough backspace (%08) characters to erase the initial static portion of a filename.
https://exchange.xforce.ibmcloud.com/vulnerabilities/26072
http://www.vupen.com/english/advisories/2006/1534
http://www.securityfocus.com/archive/1/439607/100/0/threaded
http://www.securityfocus.com/archive/1/432226/100/0/threaded
http://www.securityfocus.com/archive/1/431990/100/0/threaded
http://securityreason.com/securityalert/796