LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘HTTP POST’

Potential leak of data: HTTP POST

9 votedvote

Detected 1 occurrence(s) of ‘POST /.* HTTP\/1\.’:

blic/] applying pattern '^.*$' to uri 'var/www/pth/trunk/htp/public/index.php'
127.0.0.1 - - [07/Jan/2011:10:45:02 --0600] [pthlocal.nationalguard.com/sid#21d01f68][rid#220590f0/initial/redir#1] (4) [perdir /var/www/pth/trunk/public/] RewriteCond: input='POST /rrportal/htp/login/authenticate?redirect= HTTP/1.1' pattern='/rrportal/(htp|op2)' [NC] => matched
127.0.0.1 - - [07/Jan/2011:10:45:02 --0600] [pthlocal.nationalguard.com/sid#21d01f68][rid#220590f0/initial/redir#1] (1) [perdir /var/www/pth/trunk/public/] pass through /var/www/pth/trunk/public/var

Source: http://pastebin.com/raw.php?i=R3tMu7dR

Potential leak of data: HTTP POST

6 votedvote

Detected 1 occurrence(s) of ‘POST /.* HTTP\/1\.’:

-697585321193462802080194682rnContent-Disposition: form-data; name="jpegPhoto"; filename="crap.jpg"rnContent-Type: image/jpegrnrnxffxd8xffxe0x00x10JFIFx00x01x01x01x00Hx00Hx00x00xffxfex00x13Created with GIMPxffxdbx00Cx00x05x03x04x04x04x03x05x04x04x04
	
u'POST /user/spiq/?username=spiq HTTP/1.1rnContent-Length: 40307rnaccept-language: en-us,en;q=0.5rnaccept-encoding: gzip, deflaternhost: localhost:8000rnaccept: application/jsonrnuser-agent: Mozilla/5.0 (X11; Linux x86_64; rv:5.0) Gecko/20100101 Firefox/5.0rnaccept-charset: ISO-8859-1,utf-8;q=0.

Source: http://pastebin.com/raw.php?i=UiVXymCZ

Potential leak of data: HTTP POST

8 votedvote

Detected 1 occurrence(s) of ‘POST /.* HTTP\/1\.’:

POST /services/WebItsService HTTP/1.1

User-Agent: 1C+Enterprise/8.2

Host: webits.1c.ru

Accept: */*

SOAPAction: ""

Content-Type: text/xml; charset=utf-8

Content-Length: 132



<soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">

.<soap:Header/>

.<soap:Body> </soap:Bo

Source: http://pastie.org/pastes/4052419/download

Potential leak of data: HTTP POST

9 votedvote

Detected 4 occurrence(s) of ‘POST /.* HTTP\/1\.’:

on2.7/socket.py", line 303, in flush
    self._sock.sendall(view[write_offset:write_offset+buffer_size])
error: [Errno 32] Broken pipe
----------------------------------------
[08/Jun/2012 14:59:13] "POST /admin/ HTTP/1.1" 200 2071
[08/Jun/2012 14:59:16] "POST /admin/ HTTP/1.1" 200 2054
[08/Jun/2012 14:59:19] "GET / HTTP/1.1" 404 2009

Source: http://pastie.org/pastes/4052364/download

Potential leak of data: HTTP POST

11 votedvote

Detected 1 occurrence(s) of ‘POST /.* HTTP\/1\.’:

r
        curl_setopt($ch, CURLOPT_RETURNTRANSFER, TRUE);     // Return in string  
        $curled_page = curl_exec($ch);
        var_dump(curl_getinfo($ch , CURLINFO_HEADER_OUT)) ;
        curl_close($ch);
        return $curled_page ;
    }
	
string 'POST /V2/COUNTY/Default.aspx HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20100101 Firefox/5.0
Host: 198.173.15.31
Accept: */*
Referer: http://198.173.15.31/V2/COUNTY/
Cookie: ASP.NET_SessionId=pqfpur45akgy3l45ujq3fail
Content-Length: 1603
Content-Type: application/x-www-f

Source: http://pastebin.com/raw.php?i=q54Ufh3Y