LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘URL with Credentials’

Potential leak of data: URL with Credentials

0 votedvote

Detected 2 occurrence(s) of ‘http[s]*:\/\/[a-z0-9\-\.]+\.[a-z]{2,3}\/.*[\?&]user(name)*=\w+&pass(word)*=\w+’:

def getinfo

require 'net/http'
require 'rubygems'
require 'xmlsimple'
require 'rexml/document'

url = 'https://myserver.com/accountinfo.php?username=USER&password=MYPASS'
xml_data = Net::HTTP.get_response(URI.parse(url)).body

data = XmlSimple.xml_in(xml_data)

# extract event information
doc = REXML::Document.new(xml_data)
titles = []
score = []
doc.elements.each('User') do |ele|
   titles << ele.text
end
doc.elements.ea

Source: http://pastebin.com/raw.php?i=1E5pMdyQ

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*’:

url = "https://z0Cmej7S78m88p5ZtKqy:x@mayerson.chargify.com/subscriptions/4188755/allocations.json"

RestClient.post url,{ allocations: [{:component_id=>25975, :quantity=>5, :memo => 'abc'}, {:component_id=>25974, :quantity=>10, :memo => 'abc'}]}.to_json
=>
RestClient::InternalServerError: 500 Internal Server 

Source: http://pastie.org/pastes/8475762/download

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*’:

url = "https://#{Chargify.api_key}:x@#{Chargify.subdomain}.chargify.com/subscriptions/#{subscription_id}/allocations"
=> "https://z0Cmej7S78m88p5ZtKqy:x@mayerson.chargify.com/subscriptions/4188755/allocations"

# la url se intentó asśi y con terminación .json

RestClient.post url,{ allocations: [{:component_id=>25975, :quantity=>5, :memo => 'abc'}, {:component_id=>25974, :quantity=>10, :memo => 'abc'}]}
=>
"[{\"allocati

Source: http://pastie.org/pastes/8475754/download

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: Simple Password

0 votedvote

Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘:

                             credentials,
                                   proxy_url="http://myproxy",
                                   proxy_port=8080,
                                   proxy_user="somebody",
                                   proxy_password="mypassword")

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*’:

pip install --upgrade --proxy http://user:pass@proxyAddress:proxyPort git+ssh://git@github.com/SomeGithubUser/somerepo.git#egg=somerepo
	
parameters = pika.ConnectionParameters('rabbit-server1',
                                   5672
                                   '/',
                                   credentials)
	
parameters = pika.Con

Source: http://pastebin.com/raw.php?i=rgHb85tN

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*’:

set :application, 'eLearning'

set :repo_url, 'https://username:secret@github.com/secret/eLearning.git'
# ask :branch, proc { `git rev-parse --abbrev-ref HEAD`.chomp }

# set default_run_options[:pty] = true
set :repository, "git@github.com:secret/secret/eLearning.git"
set :deploy_to, '/home/ubuntu/elearning.staging'
set :scm, :g

Source: http://pastebin.com/raw.php?i=4nmsiyUx

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.