LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘URL with Credentials’

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

<?php
$request = ("https://username:passowrd@www.net2sms.gr/srvauth/index?cmd=easysms&action=send_sms&originator=tcp&mobile_number=3012321321321&text=test");
$handle = fopen($request, "r");
if ($handle) { echo "Works"; }
?>

Source: http://pastebin.com/raw.php?i=hUetBMF4

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

http://mylogin:mypassword@mywebpage.com
	
.*:.*:([^@]+)@

Source: http://pastebin.com/raw.php?i=BbqQbZ0s

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 2 occurrence(s) of ‘http[s]*:\/\/[a-z0-9\-\.]+\.[a-z]{2,3}\/.*[\?&]user(name)*=\w+&pass(word)*=\w+':

http://sjn00701.corp.jndata.net/topaz/bam/BAMOpenApi?customerId=1&userName=BECStatus&password=rO0ABXQABl5iwrd8XA==&viewName=Total Statusbillede&command=getNodes&addRecallAtts=y&depth=2&forcedPropogationDepth=1&layout=hierarchical&showTooltip=false&xsltURL=http://sjn00701.CORP.JNDATA.NET/topaz/mobile/dash/becallstatus.xsl&responseContentType=text%2Fhtml&isEncrypt=y

Source: http://pastebin.com/raw.php?i=EgyX7qmT

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 4 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

')
Expecting:
    ('http', 'joe', 'password', 'proxy.example.com:3128')
ok
Trying:
    _parse_proxy('ftp://joe:password@proxy.example.com/rubbish:3128')
Expecting:
    ('ftp', 'joe', 'password', 'proxy.example.com')
ok
Trying:
    _parse_proxy('http://joe:password@proxy.example.com')
Expecting:
    ('http', 'joe', 'password', 'proxy.example.com')
ok
157 items had no tests:
    urllib.request
    urllib.request.AbstractBasicAuthHandler
    urllib.request.AbstractBasicAuthHandler.__init__
    urllib.request.AbstractBasicAu

Source: http://pastebin.com/raw.php?i=5LBAjkVW

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 11 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

service [https://localhost:8444/Testing/j_spring_cas_security_check] for user [ankit@yopmail.com]>
2014-03-01 00:50:02,745 INFO [org.jasig.cas.CentralAuthenticationServiceImpl] - <Granted service ticket [ST-11-5mnVJS4AabPKx2vXxrWy-localhost] for service [https://localhost:8444/Testing/j_spring_cas_security_check] for user [ankit@yopmail.com]>
	
<security:global-method-security secured-annotations="disabled"></security:global-method-security>
<security:http auto-config="false" entry-point-ref="casAuthenticationEntryPoint">
<security:intercept-url pattern="/js/**" access="IS_AUTHENTICATED_AN

Source: http://pastebin.com/raw.php?i=XWdfMvD9

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.