secubox-openwrt/package/secubox/secubox-app-mitmproxy/files
CyberMind-FR 418cb2c76e fix(mitmproxy): Fix SSRF false positives for internal traffic
SSRF detection was triggering on any request to internal IPs
(192.168.x.x, 10.x.x.x, etc.) because it was checking the target
URL itself. Now only checks query parameters and request body for
SSRF patterns, which is where actual SSRF attacks occur.

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-02-14 05:38:26 +01:00
..
etc feat(waf): Update WAF scenarios with 2024-2025 CVEs and OWASP threats 2026-02-12 05:02:57 +01:00
srv/mitmproxy fix(mitmproxy): Fix SSRF false positives for internal traffic 2026-02-14 05:38:26 +01:00
usr fix(mitmproxy): Add per-instance haproxy_router_enabled override 2026-02-14 05:21:07 +01:00