Linux eyewebsolution.dnshostserver.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
Apache
: 185.131.55.234 | : 216.73.216.138
676 Domain
5.6.40
omxrelocation
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
imunify360 /
scripts /
[ HOME SHELL ]
Name
Size
Permission
Action
modsec_scan.py
878
B
-rwxr-xr-x
modsec_scan_real.py
2.39
KB
-rwxr-xr-x
pureftpd-on-upload
5.81
MB
-rwxr-xr-x
wp-capability-check
6.57
MB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : modsec_scan.py
#!/bin/bash # FIXME: workaround for bug https://cloudlinux.atlassian.net/browse/DEF-2271 if grep -q 'enable_scan_modsec:\s*true' /etc/sysconfig/imunify360/imunify360-merged.config; then out=($(/usr/share/imunify360/scripts/modsec_scan_real.py "$@")) echo "${out[@]}" # Script prints one of two possible lines: # '1 OK' - when malware is not found in the file # '0 Attempt to upload malware' - when malware has been found in the file # At the moment, Coraza does not handle script output properly: # https://github.com/corazawaf/coraza/pull/1311 # Thus we exit with code 1 to make Coraza pass the file and with code 0 to block the file. # The original modsec 2.x don't care about exit code either, so it should handle it fine. code=${out[0]} [[ "$code" =~ ^[0-9]+$ ]] || code=1 exit $code else echo "1 OK" exit 1 fi
Close