LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘URL with Credentials’

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

diff --git a/Gemfile.lock b/Gemfile.lock
index 5b572b0..9d7aa04 100644
--- a/Gemfile.lock
+++ b/Gemfile.lock
@@ -46,7 +46,7 @@ GEM
   remote: https://rubygems.org/
   remote: http://api:rdn4dxyvoFhW5gTmtssjJw@gems.api.no/
   specs:
-    activesupport (4.1.0)
+    activesupport (4.1.1)
       i18n (~> 0.6, >= 0.6.9)
       json (~> 1.7, >= 1.7.7)
       minitest (~> 5.1)
@@ -79,7 +79,7 @@ GEM
       safe_yaml (~> 1.0.0)
     curb (0.8.5)
     daemons (1.1.9)
-    dalli 

Source: http://pastie.org/pastes/9158610/download

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

 perl soap -s='XXX.XXX.TLD/ocsinventory' -u='XXX' -pw='XXX' -proto='http' -t='INVENTORY' -w='0'                       
defined(@array) is deprecated at soap line 51.
        (Maybe you should just omit the defined()?)
Launching soap request to proxy:

http://g530751:Sigma.16@sgisbruap190.gisa-halle.de/ocsinventory/ocsinterface

Function: <get_computers_V1>
Function Arg 1: `
<REQUEST>
  <ENGINE>FIRST</ENGINE>
  <ASKING_FOR>INVENTORY</ASKING_FOR>
  <CHECKSUM>131071</CHECKSUM>
  <OFFSET>0</OFFSET>
  <WANTED>0</WANTED>
</REQUEST>

'

I

Source: http://pastebin.com/raw.php?i=etLkLCj0

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 3 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

if($xmlGmailFeed = simplexml_load_file("https://USERNAME:PASSWORD@gmail.google.com/gmail/feed/atom/")) 
    $unreadMessages = $xmlGmailFeed->fullcount;

https://USERNAME:PASSWORD@mail.google.com/mail/feed/atom/

simplexml_load_file(rawurlencode("https://USERNAME:PASSWORD@gmail.google.com/gmail/feed/atom/"))

Source: http://pastebin.com/raw.php?i=7esyEx1C

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

<a> blah blah blah <img src="http://www.something.com/1234.jpg">
	
(/.+?\.jpg)
	
(?<=/).+?(?=\.jpg)
	
NSString *searchString =@"http://johndoe:secret@www.example.com:8080/private/mail/index.html";
NSString *regexString  = @"\b(https?)://(?:(\S+?)(?::(\S+?))?@)?([a-zA-Z0-9\-.]+)(?::(\d+))?((?:/[a-zA-Z0-9\-._?,'+\&%$=~*!():@\\]*)+)?";

if([searchString isMatchedByRegex:regexString]) {
  NSString *protocolString = [s

Source: http://pastebin.com/raw.php?i=6vgZRGDG

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

machine <servername>
login <username>
password <password>
	
chmod 600 ~/.netrc
	
$ git config remote.origin.url = http://username:password@origin_link.com/repository.git
	
git config credential.helper store
	
git push

Source: http://pastebin.com/raw.php?i=ZjPxTz9a

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.