Add detection patterns for latest actively exploited vulnerabilities: - CVE-2025-55182 (React2Shell, CVSS 10.0) - CVE-2025-8110 (Gogs RCE), CVE-2025-53770 (SharePoint) - CVE-2025-52691 (SmarterMail), CVE-2025-40551 (SolarWinds) - CVE-2024-47575 (FortiManager), CVE-2024-21887 (Ivanti) - CVE-2024-3400, CVE-2024-0012, CVE-2024-9474 (PAN-OS) New attack categories based on OWASP Top 10 2025: - HTTP Request Smuggling (TE.CL/CL.TE conflicts) - AI/LLM Prompt Injection (ChatML, instruction markers) - WAF Bypass techniques (Unicode normalization, double encoding) - Supply Chain attacks (CI/CD poisoning, dependency confusion) - Extended SSTI (Jinja2, Freemarker, Velocity, Thymeleaf) - API Abuse (BOLA/IDOR, mass assignment) CrowdSec scenarios split into 11 separate files for reliability. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
17 lines
314 B
JSON
17 lines
314 B
JSON
{
|
|
"luci-app-cookie-tracker": {
|
|
"description": "Grant access to Cookie Tracker Dashboard",
|
|
"read": {
|
|
"ubus": {
|
|
"luci.cookie-tracker": ["status", "list", "report"]
|
|
},
|
|
"uci": ["cookie-tracker"]
|
|
},
|
|
"write": {
|
|
"ubus": {
|
|
"luci.cookie-tracker": ["block", "unblock", "classify"]
|
|
}
|
|
}
|
|
}
|
|
}
|