Add detection patterns for latest actively exploited vulnerabilities: - CVE-2025-55182 (React2Shell, CVSS 10.0) - CVE-2025-8110 (Gogs RCE), CVE-2025-53770 (SharePoint) - CVE-2025-52691 (SmarterMail), CVE-2025-40551 (SolarWinds) - CVE-2024-47575 (FortiManager), CVE-2024-21887 (Ivanti) - CVE-2024-3400, CVE-2024-0012, CVE-2024-9474 (PAN-OS) New attack categories based on OWASP Top 10 2025: - HTTP Request Smuggling (TE.CL/CL.TE conflicts) - AI/LLM Prompt Injection (ChatML, instruction markers) - WAF Bypass techniques (Unicode normalization, double encoding) - Supply Chain attacks (CI/CD poisoning, dependency confusion) - Extended SSTI (Jinja2, Freemarker, Velocity, Thymeleaf) - API Abuse (BOLA/IDOR, mass assignment) CrowdSec scenarios split into 11 separate files for reliability. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
79 lines
2.2 KiB
JavaScript
79 lines
2.2 KiB
JavaScript
'use strict';
|
|
'require view';
|
|
'require form';
|
|
'require uci';
|
|
'require secubox/kiss-theme';
|
|
|
|
return view.extend({
|
|
load: function() {
|
|
return uci.load('lyrion');
|
|
},
|
|
|
|
render: function() {
|
|
var m, s, o;
|
|
|
|
m = new form.Map('lyrion', _('Lyrion Settings'),
|
|
_('Configure Lyrion Music Server settings. Changes require service restart to take effect.'));
|
|
|
|
s = m.section(form.TypedSection, 'lyrion', _('General Settings'));
|
|
s.anonymous = true;
|
|
s.addremove = false;
|
|
|
|
o = s.option(form.Flag, 'enabled', _('Enabled'),
|
|
_('Enable Lyrion Music Server'));
|
|
o.default = '0';
|
|
o.rmempty = false;
|
|
|
|
o = s.option(form.ListValue, 'runtime', _('Container Runtime'),
|
|
_('Select the container runtime to use'));
|
|
o.value('auto', _('Auto-detect (LXC preferred)'));
|
|
o.value('lxc', _('LXC Container'));
|
|
o.value('docker', _('Docker'));
|
|
o.default = 'auto';
|
|
|
|
o = s.option(form.Value, 'port', _('Web UI Port'),
|
|
_('Port for the Lyrion web interface'));
|
|
o.datatype = 'port';
|
|
o.default = '9000';
|
|
o.placeholder = '9000';
|
|
|
|
o = s.option(form.Value, 'data_path', _('Data Path'),
|
|
_('Path to store Lyrion configuration and cache'));
|
|
o.default = '/srv/lyrion';
|
|
o.placeholder = '/srv/lyrion';
|
|
|
|
o = s.option(form.Value, 'media_path', _('Media Path'),
|
|
_('Path to your music library'));
|
|
o.default = '/srv/media';
|
|
o.placeholder = '/srv/media';
|
|
|
|
o = s.option(form.Value, 'memory_limit', _('Memory Limit'),
|
|
_('Maximum memory for the container (e.g., 256M, 512M, 1G)'));
|
|
o.default = '256M';
|
|
o.placeholder = '256M';
|
|
|
|
o = s.option(form.Value, 'timezone', _('Timezone'),
|
|
_('Timezone for the container'));
|
|
o.default = 'UTC';
|
|
o.placeholder = 'UTC';
|
|
|
|
o = s.option(form.Flag, 'wan_access', _('WAN Access'),
|
|
_('Also open Lyrion ports on the WAN interface (remote access)'));
|
|
o.default = '0';
|
|
o.rmempty = false;
|
|
|
|
o = s.option(form.Value, 'image', _('Docker Image'),
|
|
_('Docker image to use (only for Docker runtime)'));
|
|
o.default = 'ghcr.io/lms-community/lyrionmusicserver:stable';
|
|
o.depends('runtime', 'docker');
|
|
|
|
return m.render().then(function(node) {
|
|
return KissTheme.wrap(node, 'admin/secubox/services/lyrion/settings');
|
|
});
|
|
},
|
|
|
|
handleSaveApply: null,
|
|
handleSave: null,
|
|
handleReset: null
|
|
});
|