Exploiting this flaw would not allow the attacker to upload code or download files, other than images, from your server. Additionally, to utilize the exploit requires that the attacker know the path to the directory the images are stored in.
This issue was first reported to our tracker by Cryptovirus.
Simply download the attached file, expand and upload the file over the copy on your server
If you are running an earlier version of IP.Board 3.0 or you would like to manually patch your installation, you may do so by modifying admin/sources/classes/member/memberFunctions.php. Look for the following line of code
//$catName = IPSText::alphanumericalClean( $catName ); // Commented out because alphanumericalClean removes spaces
Change this line of code to
$catName = IPSText::alphanumericalClean( $catName, ' ' );
Save the file and upload to your server.
The main download has been updated at the time of this announcement.
Source: Click Here