Coppermine Photo Gallery before 1.5.20 allows remote attackers to obtain sensitive information via (1) a direct request to plugins/visiblehookpoints/index.php, an invalid (2) page or (3) cat parameter to thumbnails.php, an invalid (4) page parameter to usermgr.php, or an invalid (5) newer_than or (6) older_than parameter to search.inc.php, which reveals the installation path in an error message.
archives.neohapsis.com/archives/bugtraq/2012-03/0167.html
coppermine.svn.sourceforge.net/viewvc/coppermine/trunk/cpg1.6.x/edit_one_pic.php?r1=8348&r2=8354
forum.coppermine-gallery.net/index.php/topic,74682.0.html
osvdb.org/80732
osvdb.org/80733
osvdb.org/80734
osvdb.org/80735
packetstormsecurity.org/files/111369/Coppermine-1.5.18-Cross-Site-Scripting-Path-Disclosure.html
www.openwall.com/lists/oss-security/2012/03/30/5
www.openwall.com/lists/oss-security/2012/03/30/6
www.openwall.com/lists/oss-security/2012/04/03/6
www.securityfocus.com/bid/52818
www.waraxe.us/advisory-81.html
www.exploit-db.com/exploits/18680