!C99Shell v. 2.0 [PHP 7 Update] [25.02.2019]!

Software: Apache. PHP/7.3.33 

uname -a: Linux acloudg.aryanict.com 4.18.0-513.9.1.lve.el8.x86_64 #1 SMP Mon Dec 4 15:01:22 UTC
2023 x86_64
 

uid=1095(katebhospital) gid=1098(katebhospital) groups=1098(katebhospital) 

Safe-mode: OFF (not secure)

/opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/plugins/   drwxr-xr-x
Free 292.85 GB of 429.69 GB (68.15%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     imunify_patch_subscription.py (3.64 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.


This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
See the GNU General Public License for more details.


You should have received a copy of the GNU General Public License
 along with this program.  If not, see <https://www.gnu.org/licenses/>.

Copyright © 2019 Cloud Linux Software Inc.

This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
import asyncio
from typing import TYPE_CHECKING

from defence360agent.contracts.messages import MessageType
from defence360agent.contracts.plugins import (
    MessageSink,
    MessageSource,
    expect,
)
from defence360agent.utils import Scope
from imav.contracts.messages import VulnerabilityPatchTask
from imav.contracts.imunify_patch_id import ensure_id_file
from imav.malwarelib.api.imunify_patch_subscription import (
    ImunifyPatchSubscriptionAPI,
)
from imav.malwarelib.config import VulnerabilityHitStatus
from imav.malwarelib.model import ImunifyPatchSubscription, VulnerabilityHit
from imav.malwarelib.utils import user_list

if TYPE_CHECKING:
    from imav.contracts.messages import RefreshImunifyPatchSubscription


class ImunifyPatchSubscriptionPlugin(MessageSink, MessageSource):
    SCOPE = Scope.AV

    async def create_sink(self, loop):
        pass

    async def create_source(self, loop, sink):
        self._sink = sink

    def __init__(self) -> None:
        self._lock = asyncio.Lock()

    @expect(MessageType.RefreshImunifyPatchSubscription)
    async def refresh_subscription(
        self, _: "RefreshImunifyPatchSubscription"
    ) -> None:
        async with self._lock:  # handle concurrent updates
            users = {
                await ensure_id_file(x["user"]): x["user"]
                for x in await user_list.panel_users()
            }
            subscribed_users_ids = (
                await ImunifyPatchSubscriptionAPI.get_subscriptions(
                    list(users.keys())
                )
            )
            # do not update subscription if something's wrong with API
            if subscribed_users_ids is None:
                return

            for user_id in subscribed_users_ids:
                if user_id in users:
                    await self._set_subscription(users[user_id])
            unsubscribed_users = [
                users[user_id]
                for user_id in users
                if user_id not in subscribed_users_ids
            ]
            self._unset_subscription(unsubscribed_users)

    async def _set_subscription(self, user: str) -> None:
        _, created = ImunifyPatchSubscription.get_or_create(user_id=user)
        if created:
            paths = [
                x.orig_file
                for x in VulnerabilityHit.select(
                    VulnerabilityHit.orig_file
                ).where(
                    VulnerabilityHit.user == user,
                    VulnerabilityHit.status
                    == VulnerabilityHitStatus.VULNERABLE,
                )
            ]
            if paths:
                await self._sink.process_message(
                    VulnerabilityPatchTask(filelist=paths, user=user)
                )

    def _unset_subscription(self, users: list[str]) -> None:
        ImunifyPatchSubscription.delete().where(
            ImunifyPatchSubscription.user_id.in_(users)
        ).execute()

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.0 [PHP 7 Update] [25.02.2019] maintained by KaizenLouie | C99Shell Github | Generation time: 0.0039 ]--