Javascript injected in the site hack - avast flags as JS:Iframe-AIU [Trj].

Various instances of this malcode here: http://killmalware.com/act2e.org/#
Read here: http://www.javascriptag.com/526_14364968/
Backlink stats act2e.org
• Linkpop: 15
• Domainpop: 9
• IP-Pop: 8
• ClassC-Pop: 8
Malcode: http://labs.sucuri.net/db/malware/malware-entry-mwexploitkitblackhole1?v49
System Details:
Running on: Apache/2.2.22
Powered by: PHP/5.3.10-1ubuntu3.16

Web application details:
Application: Joomla! 1.5 - Open Source Content Management - http://www.joomla.org
Google Analytics installed: UA-7010321-4

Web application version:
Joomla Version 1.5.8 to 1.5.14 for: htxp://act2e.org/media/system/js/caption.js
Joomla Version 1.5.9 to 1.5.13 for: htxp://act2e.org/language/en-GB/en-GB.ini
Joomla version outdated: Upgrade required.
Outdated Joomla Found: Joomla under 2.5.26 or 3.3.5
Outdated Web Server Apache Found: Apache/2.2.22

PHP version exploitable? → http://security.stackexchange.com/questions/17407/how-can-i-use-this-path-bypass-exploit-local-file-inclusion

The tacker tracker report results attached - do not open up uri’s from there in a browser - for security research puprposes only

polonus