This was the root cause of my issue as well. Annoying that it was something so simple and yet I did not think of it!!
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts Menu{
"status": "error",
"message": "parse error. not well formed"
}
Quote from: franco on March 12, 2025, 12:13:47 PMCVE-2025-27516 affecting Jinja2 was fixed in community yesterday and isn't much older than that if at all exploitable. I already planned to hotfix business, but we also need to ensure that these things don't cause regressions first. But also:
plugins % git grep '|[^a-z]*attr' */*/src/opnsense/service/templates | wc -l
0
core % git grep '|[^a-z]*attr' src/opnsense/service/templates | wc -l
0
For CVE-2025-26466 it's a bit different. Medium score and DoS warrant patching and I agree it needs patching in the next release, though that's also where it would be patched at the latest anyway. By default SSH is not exposed and you can even use IPS or firewall to rate limit.
Cheers,
Franco
Quote from: newsense on March 12, 2025, 12:39:59 PMVulnerability scanners are blunt instruments, and context always matters. Your security team should adjust for that.
Based on your description, you already had the mitigations in place before either vulnerability was announced.
Priority wise, should you actually have an attacker on the management network there is an argument to be made that higher value targets exist there. Bringing down a bunch of FWs would hardly be a financially rewarding endeavour.
{% if helpers.exists('interfaces.'+int+'.ipaddr') %}
{% set interface_ip = helpers.getNodeByTag('interfaces.'+int+'.ipaddr') %}
{% if '.' in interface_ip %}
--- do stuff here ---
{% endif %}
{% endif %}
Quote from: Patrick M. Hausen on November 08, 2024, 03:14:17 PM
That would be awesome!
./opnsense-version -o
FreeBSD|SMP|amd64|OPNsense|24.7.8|vmware|
{% if OPNsense.netsnmp.general.enableobservium == '1' %}
extend .1.3.6.1.4.1.2021.7890.1 distro /usr/local/sbin/opnsense-version -o
extend .1.3.6.1.4.1.2021.7890.2 hardware /bin/kenv smbios.planar.product
extend .1.3.6.1.4.1.2021.7890.3 vendor /bin/kenv smbios.planar.maker
extend .1.3.6.1.4.1.2021.7890.4 serial /bin/kenv smbios.planar.serial
{% endif %}
Quote from: Patrick M. Hausen on November 08, 2024, 02:30:02 PMWhat does it report in that OID? I don't get anything on my OPNsense querying that:Quote from: TotalGriffLock on November 08, 2024, 02:01:57 PM
The net-snmpd plugin has an option to expose the version of OPNsense under a specific OID. This is a tickbox in the GUI provided by this plugin:
This adds the following line to the snmpd config file:extend version /usr/local/sbin/opnsense-version
This has the effect of putting whatever the output is of that command, into that OID.
Observium uses .1.3.6.1.4.1.2021.7890.1 which is what you get when you enable Observium support in the current version of the plugin. Just for reference - I have no idea why there are (at least) two different OIDs. Also Observium does not use opnsense-version but relies on its own "distro" script for all Unix platforms.
root@x-y-z:~ # snmpwalk -v3 -u xxx -a sha -x aes -A xxx -X xxx -l authPriv 127.0.0.1 .1.3.6.1.4.1.2021.7890.1
UCD-SNMP-MIB::ucdavis.7890.1 = No Such Object available on this agent at this OID
# [i] fetch certificate for https://opnsense-update.deciso.com