configd: change https://github.com/opnsense/core/commit/c8cd5565ec135a0111497fde2e20e3cb79324f0d seemed to have uncovered another issue when it comes to file generation, as each call generates a new tempfile, we're now keeping a lot of them.
In order to fix this behavoir, only generate the filename and reuse it when serving cached commands, which was the intention from the beginning.
kea: kea_prefix_watcher guard when no link-local address exists for a route that should be installed (#9905)
(cherry picked from commit dddecb4ca7aa80d59abab1a4e940324d14963d94)
mvc: BaseListField $hash access to static options #9816
Also make $internalStaticOptList private and reshuffle the callers
for maximum effect.
(cherry picked from commit feee43402d946e5c3799d412a77f7a5801f822c3)
firewall: make MVC protocol selection much more like old GUI
This means list most frequently used protocols first, but only if
found in the list that has been built (including additional option
like TCP/UDP from model).
(cherry picked from commit 29dab2fa77c748d12e623333e98ddd299c2ded96)
firewall: merge read of groups and interfaces
They are stored in the same location and used by the interface
field type as such. This prevents showing unrendered groups
and also displays the consistent label between the rule and
rules selectors.
(cherry picked from commit fce88501cc9dcd4d225083cd14be8532ee346111)
(cherry picked from commit 16bc9ee719da5443a23f33ab925071a9b18e30a8)
mvc: fix CSRF vulnerability in multiple API endpoints by enforcing POST-only requests
Several API actions executed state-changing backend operations while accepting
GET requests. Since CSRF validation in ApiControllerBase only applies to
POST/PUT/DELETE methods, these endpoints could be triggered via authenticated
CSRF requests.
This patch enforces POST-only access for the following actions:
- AliasUtilController::updateBogonsAction
- OverviewController::reloadInterfaceAction
- ServiceController::dnsblAction
- ServiceController::reconfigureGeneralAction
(cherry picked from commit ac7a8024c2804b4fa213c38e30e4d97bc7f955cc)
(cherry picked from commit 0903e242adade4a2d7521fb93d0805da5988cfc0)
Merge commit from fork
* Fix CSRF vulnerability in multiple API endpoints by enforcing POST-only requests
Several API actions executed state-changing backend operations while accepting
GET requests. Since CSRF validation in ApiControllerBase only applies to
POST/PUT/DELETE methods, these endpoints could be triggered via authenticated
CSRF requests.
This patch enforces POST-only access for the following actions:
- AliasUtilController::updateBogonsAction
- OverviewController::reloadInterfaceAction
- ServiceController::dnsblAction
- ServiceController::reconfigureGeneralAction
Non-POST requests now return HTTP 405 with Allow: POST.
* simplify POST enforcement to match project conventions
[9 lines not shown]