PHP remote file inclusion vulnerability in template.class.php in Carbonize Lazarus Guestbook before 1.7.3 allows remote attackers to execute arbitrary PHP code via a URL in the include_path parameter to admin.php, probably due to a dynamic variable evaluation vulnerability. This vulnerability has been addressed by the vendor with a product update:
http://carbonize.co.uk/Lazarus/downloads.php
Publication date: Sat, 17 Mar 2007 02:19:00 +0000