⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.32
Server IP:
15.204.235.159
Server:
Linux srv.techlup.co.ke 4.18.0-553.5.1.el8_10.x86_64 #1 SMP Wed Jun 5 09:12:13 EDT 2024 x86_64
Server Software:
Apache
PHP Version:
8.2.27
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
setroubleshoot
/
plugins
/
__pycache__
/
View File Name :
httpd_unified.cpython-36.opt-1.pyc
3 nm�au � @ sD d dl Z e jddd�Zej Zd dlZd dlmZ G dd� de�ZdS )� Nzsetroubleshoot-pluginsT)Zfallback)�Pluginc @ sL e Zd Zed�Zed�Zed�ZdZed�Zed�Z dZ dd � Zd d� ZdS ) �pluginz? SELinux prevented httpd $ACCESS access to http files. aZ SELinux prevented httpd $ACCESS access to http files. Ordinarily httpd is allowed full access to all files labeled with http file context. This machine has a tightened security policy with the $BOOLEAN turned off, this requires explicit labeling of all files. If a file is a cgi script it needs to be labeled with httpd_TYPE_script_exec_t in order to be executed. If it is read only content, it needs to be labeled httpd_TYPE_content_t. If it is writable content, it needs to be labeled httpd_TYPE_script_rw_t or httpd_TYPE_script_ra_t. You can use the chcon command to change these context. Please refer to the man page "man httpd_selinux" or <a href="http://fedora.redhat.com/docs/selinux-apache-fc3">FAQ</a> "TYPE" refers to one of "sys", "user" or "staff" or potentially other script types. zg Changing the "$BOOLEAN" boolean to true will allow this access: "setsebool -P $BOOLEAN=1" zsetsebool -P $BOOLEAN=1zcIf you want to allow httpd to execute cgi scripts and to unify HTTPD handling of all content files.z_you must tell SELinux about this by enabling the 'httpd_unified' and 'http_enable_cgi' booleansz1# setsebool -P httpd_unified=1 httpd_enable_cgi=1c C s t j| t� | jd� d S )N� )r �__init__�__name__Zset_priority)�self� r �2/usr/share/setroubleshoot/plugins/httpd_unified.pyr = s zplugin.__init__c C sL |j d�rH|jd�rH|jdks(|jdkrHtjd� rHtjd� rH| j� S d S )Nzhttpd_t httpd_.*_script_tz httpd_.*t�file�dirZ httpd_unifiedZhttpd_enable_cgi)Zmatches_source_typesZmatches_target_typesZtclass�selinuxZsecurity_get_boolean_activeZreport)r Zavcr r r �analyzeA s zplugin.analyzeN) r � __module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ then_textZdo_textr r r r r r r s r )�gettextZtranslationr r Zsetroubleshoot.Pluginr r r r r r �<module> s