⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.67
Server IP:
50.6.168.112
Server:
Linux server-617809.webnetzimbabwe.com 5.14.0-570.25.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Jul 9 04:57:09 EDT 2025 x86_64
Server Software:
Apache
PHP Version:
8.4.10
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
setroubleshoot
/
plugins
/
View File Name :
selinuxpolicy.py
# @author Thomas Liu
# @author Dan Walsh
# # Copyright (C) 2009 Red Hat, Inc. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. # import gettext translation=gettext.translation('setroubleshoot-plugins', fallback=True) _=translation.gettext from setroubleshoot.util import * from setroubleshoot.Plugin import Plugin class plugin(Plugin): summary =_(''' Your system may be seriously compromised! ''') problem_description = _(''' SELinux has prevented $SOURCE from modifying $TARGET. This denial indicates $SOURCE was trying to modify the selinux policy configuration. All applications that need this access should have already had policy written for them. If a compromised application tries to modify the SELinux policy this AVC will be generated. This is a serious issue. Your system may very well be compromised. ''') fix_description = "Contact your security administrator and report this issue." fix_cmd = "" if_text = _("If you do not think $SOURCE_BASE_PATH should try $ACCESS access on $TARGET_BASE_PATH.") then_text = _("you may be under attack by a hacker, since confined applications should not need this access.") do_text = _("Contact your security administrator and report this issue.") def __init__(self): Plugin.__init__(self, __name__) self.level="red" def analyze(self, avc): if ((avc.has_any_access_in(['write']) or avc.open_with_write()) and avc.matches_target_types(['selinux_config_t', 'default_context_t', 'file_context_t', 'semanage_store_t', 'semanage_read_lock_t', 'semanage_trans_lock_t', 'load_policy_exec_t', 'setfiles_exec_t', 'checkpolicy_exec_t', 'newrole_exec_t', 'policy_src_t', 'restorecond_exec_t', 'run_init_exec_t', 'setsebool_exec_t', 'semanage_exec_t', 'selinux_var_lib_t' ])): # MATCH return self.report() return None