|
|
e58f479cd4
|
feat(waf): Update WAF scenarios with 2024-2025 CVEs and OWASP threats
Add detection patterns for latest actively exploited vulnerabilities:
- CVE-2025-55182 (React2Shell, CVSS 10.0)
- CVE-2025-8110 (Gogs RCE), CVE-2025-53770 (SharePoint)
- CVE-2025-52691 (SmarterMail), CVE-2025-40551 (SolarWinds)
- CVE-2024-47575 (FortiManager), CVE-2024-21887 (Ivanti)
- CVE-2024-3400, CVE-2024-0012, CVE-2024-9474 (PAN-OS)
New attack categories based on OWASP Top 10 2025:
- HTTP Request Smuggling (TE.CL/CL.TE conflicts)
- AI/LLM Prompt Injection (ChatML, instruction markers)
- WAF Bypass techniques (Unicode normalization, double encoding)
- Supply Chain attacks (CI/CD poisoning, dependency confusion)
- Extended SSTI (Jinja2, Freemarker, Velocity, Thymeleaf)
- API Abuse (BOLA/IDOR, mass assignment)
CrowdSec scenarios split into 11 separate files for reliability.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
|
2026-02-12 05:02:57 +01:00 |
|
|
|
8055bca368
|
feat(interceptor): Add InterceptoR transparent traffic interception
The Gandalf Proxy - unified traffic interception with 5 pillars:
New packages:
- secubox-cookie-tracker: HTTP cookie classification with mitmproxy addon
- SQLite database for cookie tracking
- 100+ known tracker domains (Google Analytics, Facebook, etc.)
- CLI: cookie-trackerctl status/list/block/report
- luci-app-interceptor: Unified dashboard aggregating all pillars
- Health score (0-100%) based on active pillars
- Status cards: WPAD, mitmproxy, CDN Cache, Cookie Tracker, API Failover
Enhanced modules:
- luci-app-network-tweaks: WPAD enforcement via iptables redirect
- setWpadEnforce/getWpadEnforce RPCD methods
- Catches clients ignoring WPAD auto-discovery
- luci-app-cdn-cache: API failover and offline mode
- stale-if-error patterns for /api/ and .json endpoints
- WAN hotplug script (99-cdn-offline) toggles offline mode
- collapsed_forwarding for duplicate request handling
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
|
2026-02-11 10:58:53 +01:00 |
|