PHP internal error creating possible leak of data

See: http://sitecheck.sucuri.net/results/www.sevdaduragi.net/bursa-sohbet-odalari.html
PHP error: Fatal error: Call to undefined function ilk_resmi_al() in /
Creating a possible leak of data, read here: http://www.leakedin.com/2012/04/page/1685/
Firekeeper flag

=== Triggered rule ===
alert(url_content:“%3C”; url_content:“%2F”; url_content:“%3E”; msg:“Suspicious looking GET request containing %3C, %3E, and %2F. Suspiciously HTML-like.”; reference:url,http://ha.ckers.org/xss.html; reference:url,http://en.wikipedia.org/wiki/Cross-site_scripting;)

=== Request URL ===
http://www.google.com/search?client=flock&channel={flock:context}&q=PHP+error%3A+Fatal+error<%2Fb>%3A+Call+to+undefined+function+ilk_resmi_al()+in+<b>%2F&ie=utf-8&oe=utf-8&aq=t


Also read on WP dot org: http://wordpress.org/support/topic/random-script-mess-it-up (posted okuogren)
Web application version:
WordPress version: WordPress 3.2.1
WordPress directory: htxp://www.sevdaduragi.net/wp-content
WordPress theme: htxp://www.sevdaduragi.net/wp-content/themes/sohbet/
Wordpress internal path: /home/sevdaduragi.net/httpdocs/wp-content/themes/sohbet/index.php
WordPress version outdated: Upgrade required.
Main site alerted by avast! Web Shield as having JS:Decode-TX[Trj]
And in this Anti WPA code: http://board.deioncube.in/printthread.php?tid=1065

polonus

Revealing data or debugging information helps an adversary learn about the system and form a plan of attack.
Taken from http://www.hpenterprisesecurity.com/vulncat/en/vulncat/php/system_information_leak_php_errors.html (info source fortify dot com) In a broader sense read: http://www.defensecode.com/public/web_vulns/information-leak.html Hardening the software so it does not give out this info to the world is an important security measure...

Regarding obfuscation and errors this tool might help towards this goal, example: http://ddecode.com/phpdecoder/?results=54a91431e44ab48462d4db6a59ae3db8
Together with this scanner http://evuln.com/tools/php-security/

polonus

virustotal
https://www.virustotal.com/en-gb/file/7e09edc532f6b478d24547fe47e0e02df190a80a20063096f82c051f32ab8ea9/analysis/1366148841/