Failed to save the file to the "xx" directory.

Failed to save the file to the "ll" directory.

Failed to save the file to the "mm" directory.

Failed to save the file to the "wp" directory.

403WebShell
403Webshell
Server IP : 66.29.132.124  /  Your IP : 3.137.175.166
Web Server : LiteSpeed
System : Linux business141.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : wavevlvu ( 1524)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /opt/imunify360/venv/lib/python3.11/site-packages/imav/migrations/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /opt/imunify360/venv/lib/python3.11/site-packages/imav/migrations/005_plesk_cleanup_storage.py
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.


This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
See the GNU General Public License for more details.


You should have received a copy of the GNU General Public License
 along with this program.  If not, see <https://www.gnu.org/licenses/>.

Copyright © 2019 Cloud Linux Software Inc.

This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
import logging
import os
from functools import lru_cache
from glob import iglob
from hashlib import sha1 as hash_func
from itertools import cycle
from pathlib import Path
from tempfile import NamedTemporaryFile
from typing import Tuple

from defence360agent.utils import run_coro
from imav.malwarelib.cleanup.storage import CleanupStorage
from imav.migration_utils.other import skip_for_im360
from imav.migration_utils.revisium import get_all_domains, get_vhosts_dir

logger = logging.getLogger(__name__)

ENCRYPT_KEY = b"IMUNIFY"

REVISIUM_DIR_PREFIX = ".revisium"
BACKUP_FILE_SUFFIX = ".imunify"
BACKUP_LOCATION = (
    ".revisium_antivirus_cache",
    f"{REVISIUM_DIR_PREFIX}*",
    "backup",
    f"*{BACKUP_FILE_SUFFIX}",
)


@lru_cache(maxsize=1)
def _get_backup_file_slices() -> Tuple[slice, slice, slice]:
    """Get backup file slices for splitting it apart"""
    key_size = len(ENCRYPT_KEY)
    digest_size = len(hash_func().hexdigest())
    meta_size = key_size + digest_size
    return (
        # content: from the beginning to the meta data
        slice(None, -meta_size),
        # key: the first part of the meta data
        slice(-meta_size, -digest_size),
        # digest: the last part of the meta data
        slice(-digest_size, None),
    )


def decrypt(encrypted: bytes) -> bytes:
    """Decrypt ex-Revisium backup file content"""
    decrypted = bytes(c ^ k for c, k in zip(encrypted, cycle(ENCRYPT_KEY)))

    content_slice, key_slice, digest_slice = _get_backup_file_slices()

    content = decrypted[content_slice]
    key = decrypted[key_slice]
    digest = decrypted[digest_slice]

    assert key == ENCRYPT_KEY
    assert hash_func(content).hexdigest() == digest.decode("latin-1")

    return content


def get_orig_filename(filename: str) -> str:
    """Figure out what the original filename of ex-Revisium backup"""
    path = Path(filename)
    domain_id = path.parent.parent.name.removeprefix(REVISIUM_DIR_PREFIX)
    orig_dir = get_all_domains()[domain_id]["document_root"]
    return os.path.join(orig_dir, path.name.removesuffix(BACKUP_FILE_SUFFIX))


def transit_backup(filename: str) -> None:
    """
    Decrypt ex-Revisium backup file and copy it to Imunify360 cleanup storage
    """
    with open(filename, "rb") as f:
        st = os.stat(f.fileno())
        encrypted = f.read()

    decrypted = decrypt(encrypted)

    with NamedTemporaryFile() as temp:
        temp.write(decrypted)
        temp.flush()

        fd = temp.fileno()
        os.chmod(fd, st.st_mode)
        os.chown(fd, st.st_uid, st.st_gid)

        orig = get_orig_filename(filename)
        dst = CleanupStorage.path / CleanupStorage.storage_name(orig)
        # noinspection PyProtectedMember,PyTypeChecker
        run_coro(
            CleanupStorage._copy(temp.name, dst, safe_src=True, safe_dst=True)
        )


def main() -> None:
    for file in iglob(os.path.join(get_vhosts_dir(), "*", *BACKUP_LOCATION)):
        try:
            transit_backup(file)
        except Exception as e:
            logger.warning("Failed to transit a backup file %r: %r", file, e)


@skip_for_im360
def migrate(migrator, database, fake=False, **kwargs):
    if fake:
        return

    main()


@skip_for_im360
def rollback(migrator, database, fake=False, **kwargs):
    pass


if __name__ == "__main__":
    main()

Youez - 2016 - github.com/yon3zu
LinuXploit