secubox-openwrt/package/secubox/luci-app-mmpm/htdocs/luci-static/resources/view/mmpm/settings.js
CyberMind-FR e58f479cd4 feat(waf): Update WAF scenarios with 2024-2025 CVEs and OWASP threats
Add detection patterns for latest actively exploited vulnerabilities:
- CVE-2025-55182 (React2Shell, CVSS 10.0)
- CVE-2025-8110 (Gogs RCE), CVE-2025-53770 (SharePoint)
- CVE-2025-52691 (SmarterMail), CVE-2025-40551 (SolarWinds)
- CVE-2024-47575 (FortiManager), CVE-2024-21887 (Ivanti)
- CVE-2024-3400, CVE-2024-0012, CVE-2024-9474 (PAN-OS)

New attack categories based on OWASP Top 10 2025:
- HTTP Request Smuggling (TE.CL/CL.TE conflicts)
- AI/LLM Prompt Injection (ChatML, instruction markers)
- WAF Bypass techniques (Unicode normalization, double encoding)
- Supply Chain attacks (CI/CD poisoning, dependency confusion)
- Extended SSTI (Jinja2, Freemarker, Velocity, Thymeleaf)
- API Abuse (BOLA/IDOR, mass assignment)

CrowdSec scenarios split into 11 separate files for reliability.

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-02-12 05:02:57 +01:00

43 lines
940 B
JavaScript

'use strict';
'require view';
'require dom';
'require ui';
'require uci';
'require form';
'require secubox/kiss-theme';
return view.extend({
title: _('MMPM Settings'),
load: function() {
return uci.load('mmpm');
},
render: function() {
var m, s, o;
m = new form.Map('mmpm', _('MMPM Settings'), _('Configure MMPM - MagicMirror Package Manager'));
s = m.section(form.NamedSection, 'main', 'mmpm', _('General Settings'));
s.anonymous = true;
s.addremove = false;
o = s.option(form.Flag, 'enabled', _('Enable GUI Service'));
o.rmempty = false;
o.default = '0';
o = s.option(form.Value, 'port', _('GUI Port'));
o.datatype = 'port';
o.default = '7891';
o.rmempty = false;
o = s.option(form.Value, 'address', _('Listen Address'));
o.default = '0.0.0.0';
o.rmempty = false;
return m.render().then(function(view) {
return KissTheme.wrap([view], 'admin/secubox/services/mmpm/settings');
});
}
});