[原文]PHP remote file inclusion vulnerability in ezUserManager 1.6 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the ezUserManager_Path parameter to ezusermanager_pwd_forgott.php, possibly due to an issue in ezusermanager_core.inc.php.
ezUserManager contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to ezusermanager_core.inc.php not properly sanitizing user input supplied to the "ezUserManager_Path" variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.
Upgrade to version 1.7 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.