晋太元中,武陵人捕鱼为业。缘溪行,忘路之远近。忽逢桃花林,夹岸数百步,中无杂树,芳草鲜美,落英缤纷。渔人甚异之,复前行,欲穷其林。 林尽水源,便得一山,山有小口,仿佛若有光。便舍船,从口入。初极狭,才通人。复行数十步,豁然开朗。土地平旷,屋舍俨然,有良田、美池、桑竹之属。阡陌交通,鸡犬相闻。其中往来种作,男女衣着,悉如外人。黄发垂髫,并怡然自乐。 见渔人,乃大惊,问所从来。具答之。便要还家,设酒杀鸡作食。村中闻有此人,咸来问讯。自云先世避秦时乱,率妻子邑人来此绝境,不复出焉,遂与外人间隔。问今是何世,乃不知有汉,无论魏晋。此人一一为具言所闻,皆叹惋。余人各复延至其家,皆出酒食。停数日,辞去。此中人语云:“不足为外人道也。”(间隔 一作:隔绝) 既出,得其船,便扶向路,处处志之。及郡下,诣太守,说如此。太守即遣人随其往,寻向所志,遂迷,不复得路。 南阳刘子骥,高尚士也,闻之,欣然规往。未果,寻病终。后遂无问津者。
| DIR:/opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/plugins/ |
| Current File : //opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/plugins/store_vulnerabilities.py |
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
Copyright © 2019 Cloud Linux Software Inc.
This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
import glob
import os
import re
from typing import Generator, Union
from defence360agent.contracts.messages import MessageType
from defence360agent.contracts.plugins import MessageSink, expect
from defence360agent.utils import nice_iterator
from imav.malwarelib.config import MalwareScanType, VulnerabilityHitStatus
from imav.contracts.plugins import ProcessOrder
from imav.malwarelib.model import MalwareScan, VulnerabilityHit
class StoreVulnerabilities(MessageSink):
PROCESSING_ORDER = ProcessOrder.AFTER_STORE_SCAN
async def create_sink(self, loop):
pass
@staticmethod
def get_outdated_entries(
path_obj: Union[str, list],
scan_type: str | None = None,
) -> Generator[str, None, None]:
"""
Return files that may already not be vulnerable, yet we still
consider them such.
For example, a vulnerable file might have been removed manually.
"""
# NOTE: this logic was taken by analogy with StoreMalwareHits
# consider optimizing this code
paths = [path_obj] if isinstance(path_obj, str) else path_obj
if scan_type == MalwareScanType.REALTIME:
# to avoid duplicates (DEF-10404)
yield from iter(paths)
return
for target_path in paths:
for path in glob.iglob(target_path):
path = os.path.realpath(path)
if (
os.path.isfile(path)
and VulnerabilityHit.select()
.where(
VulnerabilityHit.orig_file
== path
& VulnerabilityHit.status.in_(
[
VulnerabilityHitStatus.VULNERABLE,
VulnerabilityHitStatus.REVERTED,
]
)
)
.first()
):
yield path
else:
scanned_dir = re.escape(path) + r"(/.*|\b)"
yield from (
i.orig_file
for i in VulnerabilityHit.select().where(
VulnerabilityHit.orig_file.regexp(scanned_dir),
VulnerabilityHit.status.in_(
[
VulnerabilityHitStatus.VULNERABLE,
VulnerabilityHitStatus.REVERTED,
]
),
)
)
def _delete_outdated_entries(self, summary: dict) -> None:
file_patterns = summary.pop("file_patterns", None)
exclude_patterns = summary.pop("exclude_patterns", None)
if (
summary.get("error") is None
and file_patterns is None
and exclude_patterns is None
):
outdated_entries = self.get_outdated_entries(
summary["path"], scan_type=summary["type"]
)
VulnerabilityHit.delete_hits(outdated_entries)
@expect(MessageType.MalwareScan)
async def process_hits(self, message):
if not message["summary"].get("started") or message["results"] is None:
# Scan is queued/aborted.
return
scan = MalwareScan.get(scanid=message["summary"]["scanid"])
# get('path') indicates that this is the second message,
# even if they are out of order
if message["summary"].get("path") is not None:
# keep the same logic as for malware hits
self._delete_outdated_entries(message["summary"])
if results := {
filename: data
for filename, data in message["results"].items()
if VulnerabilityHit.match(data["hits"][0]["matches"])
}:
# TODO: handle possible races when we implement patch/revert
async for filename, data in nice_iterator(results.items()):
# the latest detection type is relevant
VulnerabilityHit.create(
scanid=scan.scanid,
owner=data["owner"],
user=data["user"],
size=data["size"],
hash=data["hash"],
orig_file=filename,
type=data["hits"][0]["matches"],
timestamp=data["hits"][0]["timestamp"],
status=VulnerabilityHitStatus.VULNERABLE,
)
|