Server IP : 66.29.132.122 / Your IP : 52.14.2.251 Web Server : LiteSpeed System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64 User : admazpex ( 531) PHP Version : 7.2.34 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/utils/ |
Upload File : |
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>. Copyright © 2019 Cloud Linux Software Inc. This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ import asyncio import logging from imav.malwarelib.utils import malware_response from defence360agent.contracts.license import LicenseError logger = logging.getLogger(__name__) FALSE_POSITIVE = "fp" FALSE_NEGATIVE = "fn" async def submit_malware(filename, type, reason=None): """ Submit file to MRS for analysis :param filename: str -> path to file to submit :param type: str -> report type (fp or fn) :param scanner: int -> scanner id :param reason: str -> malware name provided by scanner :raises LicenseError: """ # submit to MRS upload_reason = ( malware_response.FALSE_POSITIVE if type == FALSE_POSITIVE else malware_response.FALSE_NEGATIVE ) try: await malware_response.upload_with_retries( filename, upload_reason=upload_reason ) except malware_response.ClientError as e: logger.error("File %s uploading failed. %s.", filename, e) def submit_in_background(*args, **kwargs): def report_error(future): e = future.exception() if isinstance(e, LicenseError): logger.warning(str(e)) elif e is not None: logger.exception("File submission failed", exc_info=e) loop = asyncio.get_event_loop() task = loop.create_task(submit_malware(*args, **kwargs)) task.add_done_callback(report_error)