<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Control WebPanel Wiki &#187; CXS Exploit Scanner</title>
	<atom:link href="https://wiki.centos-webpanel.com/tag/cxs-exploit-scanner/feed" rel="self" type="application/rss+xml" />
	<link>https://wiki.centos-webpanel.com</link>
	<description>CentOS WebPanel Wiki</description>
	<lastBuildDate>Wed, 12 Feb 2025 20:38:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Install CXS ( ConfigServer eXploit Scanner )</title>
		<link>https://wiki.centos-webpanel.com/install-cxs-configserver-exploit-scanner</link>
		<comments>https://wiki.centos-webpanel.com/install-cxs-configserver-exploit-scanner#comments</comments>
		<pubDate>Mon, 30 Mar 2020 06:01:19 +0000</pubDate>
		<dc:creator><![CDATA[publisher]]></dc:creator>
				<category><![CDATA[3rdParty]]></category>
		<category><![CDATA[CXS Exploit Scanner]]></category>

		<guid isPermaLink="false">http://wiki.centos-webpanel.com/?p=1343</guid>
		<description><![CDATA[ConfigServer eXploit Scanner (cxs) is a tool from configserver that performs active scanning of files as they are uploaded to the server. First you need to download and install cxs from the official site : Step 1 cd /usr/src rm -f cxs* wget https://download.configserver.com/cxsinstaller.tgz tar -xzf cxsinstaller.tgz chattr -i -R /usr/local/cwpsrv/htdocs/admin/ perl cxsinstaller.pl ipv4 rm [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>ConfigServer eXploit Scanner (cxs) is a tool from configserver that performs <b>active scanning</b> of files as they are uploaded to the server.</p>
<h2>First you need to download and install cxs from the official site :</h2>
<h2>Step 1</h2>
<pre>cd /usr/src
rm -f cxs*
wget https://download.configserver.com/cxsinstaller.tgz
tar -xzf cxsinstaller.tgz
chattr -i -R /usr/local/cwpsrv/htdocs/admin/
perl cxsinstaller.pl <span style="color: #ff0000;"><strong>ipv4</strong></span>
rm -fv cxsinstaller.*</pre>
<p>replace "<span style="color: #ff0000;"><strong>ipv4</strong></span>" with the licensed server IP.</p>
<h2>Step 2</h2>
<p>After installing go to <strong>CWP.admin</strong> &gt; <strong>Configserver Scripts</strong> &gt;&gt; <strong>ConfigServer Exploit Scanner</strong> and go through onscreen instruction, we recommend to use default settings.</p>
<p>That's it you're done.</p>
<p><strong>Troubleshoot if the CXS GUI asking for clamd scanner socket run the below command and restart cxswatch service :</strong></p>
<p><strong>Add clamd socket to cxs config for the scanner :</strong></p>
<pre>sed -i '$ a clamdsock=/var/run/clamd.amavisd/clamd.sock' /etc/cxs/cxs.defaults</pre>
<p><strong>Restart CXS service :</strong></p>
<pre>service cxswatch restart</pre>
<p><strong>TESTED BY CWP TEAM</strong><br />
- Malware upload over FTP/SFTP<br />
- Malware upload using CWP User Panel<br />
- Malware upload using any PHP version CWP has including PHP-FPM and CGI<br />
<em>* Upload will fail if CXS detects that file contains the malware.</em></p>
]]></content:encoded>
			<wfw:commentRss>https://wiki.centos-webpanel.com/install-cxs-configserver-exploit-scanner/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
