LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘URL with Credentials’

Potential leak of data: URL with Credentials

0 votedvote

Detected 2 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

p://142.4.216.60:1935/edge/_definst_/nz7l9vc5nv1og7b/playlist.m3u8?wowzasessionid=1419880374&xs=_we_Mzcxamx1aXJsamNzamVufDE0MTk5MTYzNzR8NzIuMjcuMjE0LjMzfDU0YTFhN2I2MzUxMWJ8ZDU3ODc0MTUyMWE0YTMyODdmZjdkYzJiMTYyZmY0MDA1YzM4NjdkYQ timeout=10
#EXTINF:-1,CBS
http://ip:tv@95.211.191.38:9981/stream/channelid/259915154
#EXTINF:-1, CNN USA
http://142.4.216.60:1935/edge/_definst_/rjxo8hz17q9waiq/playlist.m3u8?wowzasessionid=1758235421&xs=_we_cmp4bzhoejE3cTl3YWlxfDEzOTY4MjM0MTZ8NDkuOTMuMzcuNjN8NTM0MWM3NjgyZTY3Nnw5YWNmYzRhM2FiNjQwMmF

Source: http://pastebin.com/raw.php?i=YN1uKuBY

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

1 votedvote

Detected 2 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

p://142.4.216.60:1935/edge/_definst_/nz7l9vc5nv1og7b/playlist.m3u8?wowzasessionid=1419880374&xs=_we_Mzcxamx1aXJsamNzamVufDE0MTk5MTYzNzR8NzIuMjcuMjE0LjMzfDU0YTFhN2I2MzUxMWJ8ZDU3ODc0MTUyMWE0YTMyODdmZjdkYzJiMTYyZmY0MDA1YzM4NjdkYQ timeout=10
#EXTINF:-1,CBS
http://ip:tv@95.211.191.38:9981/stream/channelid/259915154
#EXTINF:-1, CNN USA
http://142.4.216.60:1935/edge/_definst_/rjxo8hz17q9waiq/playlist.m3u8?wowzasessionid=1758235421&xs=_we_cmp4bzhoejE3cTl3YWlxfDEzOTY4MjM0MTZ8NDkuOTMuMzcuNjN8NTM0MWM3NjgyZTY3Nnw5YWNmYzRhM2FiNjQwMmF

Source: http://pastebin.com/raw.php?i=tzBpvFmq

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: Simple Password

0 votedvote

Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]':

 sla-core
    brooklyn.config:
      java.sysprops:
          DB_URL: >
              $brooklyn:formatString("jdbc:%s%s",
              component("sla-db").attributeWhenReady("datastore.url"), "sc_sla")
          DB_USERNAME: "atossla"
          DB_PASSWORD: "_atossla_"
    war: https://oss.sonatype.org/service/local/artifact/maven/redirect?r=snapshots&g=eu.seaclouds-project&a=sla-service&v=LATEST&e=war
    install.latch: $brooklyn:component("sla-db").attributeWhenReady("service.isUp")

  - serviceType: brooklyn.enti

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

 echo  -n $GF_DATASOURCE_ADDRESS >> init_datastore.json 
     echo  -n '","access":"proxy","basicAuth":false,"isDefault":true}' >> init_datastore.json
     curl -X POST -i -H "Accept: application/json" -H "Content-type: application/json" -u admin:admin http://localhost:3000/api/datasources -d @init_datastore.json
     rm init_datastore.json
     ln -s /var/run/grafana-server.pid $PID_FILE

   env:
     GF_USERS_ALLOW_SIGN_UP: "false"
     GF_ANALYTICS_REPORTING_ENABLED: "false"
     GF_SECURITY_ADMIN_USER: "admin"
     GF_SECURITY_ADMIN_PASSWORD: "admin"

Source: http://pastebin.com/raw.php?i=k8Ygs5HJ

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 16 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

124.png
21:37:21 T:4480   DEBUG: JSONRPC: Incoming request: {"jsonrpc": "2.0", "method": "Application.GetProperties", "params": { "properties": [ "volume", "muted" ] }, "id": 1}
21:37:21 T:3312   DEBUG: ### Oz Weather - 0.8.1 ### Retrieving radar image: ftp://anonymous:someone%40somewhere.com@ftp.bom.gov.au//anon/gen/radar/IDR713.T.201507281130.png
21:37:21 T:5388   DEBUG: webserver: request received for /jsonrpc
21:37:21 T:3932   DEBUG: Previous line repeats 1 times.
21:37:21 T:3932   DEBUG: JSONRPC: Incoming request: {"id":1,"jsonrpc":"2.0","meth

Source: http://pastebin.com/raw.php?i=at0ubsri

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

:~/tmp$ touch "asdf (blah blah rawr).php"
rbos@chili:~/tmp$ find | grep "(.*)"
./asdf (blah blah rawr).php
./asdf (blah blah blah).php
	
find | grep "(.*)" | while read i; do echo "$i";done | less
	
powershell.exe -File find_duplicates.ps1 -sessionUrl ftp://user:password@example.com/ -remotePath /path

Source: http://pastebin.com/raw.php?i=evmbeHXs

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.