{"id":1732,"date":"2020-02-18T07:12:14","date_gmt":"2020-02-18T06:12:14","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1732"},"modified":"2020-02-19T07:14:55","modified_gmt":"2020-02-19T06:14:55","slug":"200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/","title":{"rendered":"200 000 SITES MENAC\u00c9S D&rsquo;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS"},"content":{"rendered":"\n<p><strong><a href=\"https:\/\/www.webarxsecurity.com\/critical-issue-in-themegrill-demo-importer\/\">Un\nrapport r\u00e9cent<\/a><\/strong> de la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 WebARX a r\u00e9v\u00e9l\u00e9 qu&rsquo;un plugin de\nth\u00e8me WordPress largement utilis\u00e9 avec plus de 200 000 installations est\nconsid\u00e9r\u00e9 comme vuln\u00e9rable \u00e0 l&rsquo;exploitation. Selon les d\u00e9couvertes, sa\nvuln\u00e9rabilit\u00e9 est facile \u00e0 exploiter et, si elle n&rsquo;est pas corrig\u00e9e \u00e0 temps,\npourrait encourager les attaquants \u00e0 distance \u00e0 <strong><a href=\"https:\/\/codeon.in\/critical-bug-in-wordpress-theme-plugin-opens-200000-sites-to-hackers\/\">compromettre\nles diff\u00e9rents blogs et sites web<\/a><\/strong> qui utilisent le plugin.<\/p>\n\n\n\n<p>Le\nrapport a r\u00e9v\u00e9l\u00e9 que ThemeGrill Demo Importer est le nom du plugin vuln\u00e9rable\nqui pourrait \u00eatre sujet \u00e0 des attaques. Le plugin WordPress comporte des th\u00e8mes\npayants et gratuits vendus par la soci\u00e9t\u00e9 de d\u00e9veloppement de logiciels\nThemeGrill.&nbsp; <\/p>\n\n\n\n<p>La\nprincipale fonction du plugin est d&rsquo;aider les administrateurs de <strong><a href=\"https:\/\/koddos.net\/blog\/several-wordpress-sites-compromised-by-malicious-codes\/\">sites\nWordPress<\/a><\/strong> \u00e0 importer des param\u00e8tres, des widgets et du contenu\nde d\u00e9monstration de ThemeGrill, ce qui facilite un peu la personnalisation du\nth\u00e8me. <\/p>\n\n\n\n<p>WebARX\na partag\u00e9 le rapport et a d\u00e9clar\u00e9 que lorsqu&rsquo;un utilisateur installe et active\nle ThemeGrill, certaines fonctions du plugin concern\u00e9 sont automatiquement\nex\u00e9cut\u00e9es. Lors de l&rsquo;ex\u00e9cution, il donne des privil\u00e8ges administrateurs sans\nv\u00e9rifier si l&rsquo;utilisateur qui ex\u00e9cute le code est l&rsquo;administrateur ou s&rsquo;il est\nauthentifi\u00e9 pour ex\u00e9cuter de tels codes.<\/p>\n\n\n\n<p><strong>Une\ntr\u00e8s grave vuln\u00e9rabilit\u00e9<\/strong><\/p>\n\n\n\n<p>Selon\nle rapport de WebARX, la vuln\u00e9rabilit\u00e9 du plugin est tr\u00e8s grave, car elle peut\ncauser beaucoup de dommages aux propri\u00e9taires de sites et de blogs qui ont\ninstall\u00e9 le plugin en question sur leur site.<\/p>\n\n\n\n<p>Comme\nil n&rsquo;a pas besoin d&rsquo;une charge utile suspecte, un pare-feu peut ne pas \u00eatre en\nmesure d&#8217;emp\u00eacher la <strong><a href=\"https:\/\/www.malaysiainternet.my\/2020\/02\/critical-bug-in-wordpress-theme-plugin-opens-200000-sites-to-hackers\">vuln\u00e9rabilit\u00e9\npar d\u00e9faut<\/a><\/strong>. Le pire est qu&rsquo;il n&rsquo;y a pas d&rsquo;ordre sp\u00e9cifique con\u00e7u\npour bloquer automatiquement la vuln\u00e9rabilit\u00e9. Cela laisse le plugin \u00e0 un\nrisque d&rsquo;exploitation tr\u00e8s \u00e9lev\u00e9, qui pourrait \u00eatre d\u00e9vastateur.<\/p>\n\n\n\n<p><strong>&nbsp;La\nvuln\u00e9rabilit\u00e9 est une invitation ouverte aux hackers<\/strong><\/p>\n\n\n\n<p>Selon\nl&rsquo;entreprise de s\u00e9curit\u00e9, la vuln\u00e9rabilit\u00e9 pourrait ouvrir une porte d\u00e9rob\u00e9e\npermettant \u00e0 des attaquants non autoris\u00e9s d&rsquo;effacer compl\u00e8tement la base de\ndonn\u00e9es des blogs ou des sites web \u00e0 son \u00e9tat par d\u00e9faut \u00e0 distance, rendant\nainsi inutiles les \u00e9normes efforts du propri\u00e9taire du site. <\/p>\n\n\n\n<p>Apr\u00e8s\navoir effac\u00e9 les donn\u00e9es du site, les hackers pourraient se connecter en tant\nqu&rsquo;administrateur du site, ce qui leur donnerait un contr\u00f4le total sur le site.<\/p>\n\n\n\n<p>WebARX\navertit que la vuln\u00e9rabilit\u00e9 pourrait faire en sorte qu&rsquo;un intrus non autoris\u00e9\nait le contr\u00f4le total du site avec tous les privil\u00e8ges de l&rsquo;administrateur du\nsite. L&rsquo;\u00e9quipe de s\u00e9curit\u00e9 a \u00e9galement indiqu\u00e9 que la vuln\u00e9rabilit\u00e9 affecte <strong><a href=\"https:\/\/wordpress.org\/plugins\/themegrill-demo-importer\/\">ThemeGrill Demo\nImporter<\/a><\/strong> des versions 1.3.4 \u00e0 1.5.1, qui ont toutes \u00e9t\u00e9 publi\u00e9es\nau cours des trois derni\u00e8res ann\u00e9es.<\/p>\n\n\n\n<p>En\ntant qu&rsquo;entreprise de cybers\u00e9curit\u00e9, WebARX d\u00e9tecte les vuln\u00e9rabilit\u00e9s et\npropose des services de mises \u00e0 jour logicielles pour d\u00e9fendre les sites web\ncontre les attaques de composants non autoris\u00e9s. La soci\u00e9t\u00e9 a envoy\u00e9 ses\nd\u00e9couvertes sur la vuln\u00e9rabilit\u00e9 aux d\u00e9veloppeurs de ThemeGrill il y a deux\nsemaines. Cependant, les d\u00e9veloppeurs de ThemeGrill ont r\u00e9pondu il y a deux\njours avec la sortie d&rsquo;un correctif de la vuln\u00e9rabilit\u00e9.<br>\n<br>\nSi un plugin WordPress est obsol\u00e8te ou fait face s\u00e9rieusement \u00e0 des <strong><a href=\"https:\/\/koddos.net\/blog\/researcher-spots-instagram-vulnerability-that-could-result-in-enormous-hack-gets-reward\/\">probl\u00e8mes\nde vuln\u00e9rabilit\u00e9<\/a><\/strong>, le tableau de bord WordPress envoie\ng\u00e9n\u00e9ralement des notifications automatiquement \u00e0 l&rsquo;administrateur. Toutefois,\nsi vous ne souhaitez pas attendre les mises \u00e0 jour manuelles des plugins, vous\npouvez d\u00e9cider de les faire mettre \u00e0 jour automatiquement. L&rsquo;option automatique\nest un moyen plus s\u00fbr et plus s\u00e9curis\u00e9 de prot\u00e9ger les sites.<\/p>\n\n\n\n<p><strong>Les\nplugins WordPress sont toujours confront\u00e9s \u00e0 des probl\u00e8mes de vuln\u00e9rabilit\u00e9<\/strong><\/p>\n\n\n\n<p>Ce\nn&rsquo;est pas la premi\u00e8re fois que des chercheurs en s\u00e9curit\u00e9 d\u00e9couvrent des\nvuln\u00e9rabilit\u00e9s dans le plugin du th\u00e8me WordPress. Et il est peu probable que ce\nsoit le dernier. Depuis le d\u00e9but de l&rsquo;ann\u00e9e, les organismes de cybers\u00e9curit\u00e9\nont signal\u00e9 des vuln\u00e9rabilit\u00e9s de plugins \u00e0 la fois de plus petite et de plus\ngrande ampleur. Certains hackers ont m\u00eame profit\u00e9 de certains cas pour\ninfiltrer et attaquer des sites.<\/p>\n\n\n\n<p>Par\nexemple, le mois dernier, <strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/thousands-of-wordpress-sites-hacked-to-fuel-scam-campaign\/\">environ\n2 000 sites WordPress ont \u00e9t\u00e9 pirat\u00e9s<\/a><\/strong> en raison de la\nvuln\u00e9rabilit\u00e9 des plugins WordPress. Les hackers ont aliment\u00e9 une campagne et\nredirig\u00e9 les visiteurs des sites touch\u00e9s vers des sites d&rsquo;escroquerie contenant\nde faux t\u00e9l\u00e9chargements flash Adobe, des cadeaux, de fausses enqu\u00eates et des\nnotifications ind\u00e9sirables de navigateur.<\/p>\n\n\n\n<p>Sucuri,\nla soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 qui a d\u00e9tect\u00e9 l&rsquo;attaque, a indiqu\u00e9 que certains des\nplugins vuln\u00e9rables exploit\u00e9s \u00e9taient les plugins \u00abSingle Fields\u00bb et le \u00abCP\ncontact form with <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-steal-1-6-million-users-personal-information-paypal-data-breach\/\">PayPal<\/a><\/strong>\u00bb.\nCependant, la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 a indiqu\u00e9 que d&rsquo;autres plugins pouvaient\n\u00e9galement \u00eatre vuln\u00e9rables. <\/p>\n\n\n\n<p>Lorsque\nla faiblesse est exploit\u00e9e, elle donne une invitation ouverte aux attaquants \u00e0\ncharger des JavaScript non autoris\u00e9s dans les th\u00e8mes des sites, donnant ainsi\naux hackers un certain contr\u00f4le sur les fonctions administrateur des sites.<\/p>\n\n\n\n<p>D&rsquo;autres\nrapports ont fait \u00e9tat de vuln\u00e9rabilit\u00e9s des plugins de th\u00e8mes WordPress. <strong><a href=\"https:\/\/www.acunetix.com\/websitesecurity\/preventing-wordpress-hack\/\">Les\nexperts en s\u00e9curit\u00e9<\/a><\/strong> conseillent aux utilisateurs d&#8217;emp\u00eacher les\nhackers de prendre le contr\u00f4le de leurs sites en mettant automatiquement \u00e0 jour\nleurs plugins.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un rapport r\u00e9cent de la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 WebARX a r\u00e9v\u00e9l\u00e9 qu&rsquo;un plugin de th\u00e8me WordPress largement utilis\u00e9 avec plus de 200 000 installations est consid\u00e9r\u00e9 comme vuln\u00e9rable \u00e0 l&rsquo;exploitation. Selon les d\u00e9couvertes, sa vuln\u00e9rabilit\u00e9 est facile \u00e0 exploiter et, si elle n&rsquo;est pas corrig\u00e9e \u00e0 temps, pourrait encourager les attaquants \u00e0 distance \u00e0 compromettre &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">200 000 SITES MENAC\u00c9S D&rsquo;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1733,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[6],"tags":[],"class_list":["post-1732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>200 000 SITES MENAC\u00c9S D&#039;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"200 000 SITES MENAC\u00c9S D&#039;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Un rapport r\u00e9cent de la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 WebARX a r\u00e9v\u00e9l\u00e9 qu&rsquo;un plugin de th\u00e8me WordPress largement utilis\u00e9 avec plus de 200 000 installations est consid\u00e9r\u00e9 comme vuln\u00e9rable \u00e0 l&rsquo;exploitation. Selon les d\u00e9couvertes, sa vuln\u00e9rabilit\u00e9 est facile \u00e0 exploiter et, si elle n&rsquo;est pas corrig\u00e9e \u00e0 temps, pourrait encourager les attaquants \u00e0 distance \u00e0 compromettre &hellip; Continue reading 200 000 SITES MENAC\u00c9S D&rsquo;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-18T06:12:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-19T06:14:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"200 000 SITES MENAC\u00c9S D&rsquo;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS\",\"datePublished\":\"2020-02-18T06:12:14+00:00\",\"dateModified\":\"2020-02-19T06:14:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/\"},\"wordCount\":949,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/\",\"name\":\"200 000 SITES MENAC\u00c9S D'ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-02-18T06:12:14+00:00\",\"dateModified\":\"2020-02-19T06:14:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"200 000 SITES MENAC\u00c9S D&rsquo;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"200 000 SITES MENAC\u00c9S D'ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/","og_locale":"fr_FR","og_type":"article","og_title":"200 000 SITES MENAC\u00c9S D'ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS - Blog KoDDoS","og_description":"Un rapport r\u00e9cent de la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 WebARX a r\u00e9v\u00e9l\u00e9 qu&rsquo;un plugin de th\u00e8me WordPress largement utilis\u00e9 avec plus de 200 000 installations est consid\u00e9r\u00e9 comme vuln\u00e9rable \u00e0 l&rsquo;exploitation. Selon les d\u00e9couvertes, sa vuln\u00e9rabilit\u00e9 est facile \u00e0 exploiter et, si elle n&rsquo;est pas corrig\u00e9e \u00e0 temps, pourrait encourager les attaquants \u00e0 distance \u00e0 compromettre &hellip; Continue reading 200 000 SITES MENAC\u00c9S D&rsquo;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS","og_url":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-02-18T06:12:14+00:00","article_modified_time":"2020-02-19T06:14:55+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"200 000 SITES MENAC\u00c9S D&rsquo;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS","datePublished":"2020-02-18T06:12:14+00:00","dateModified":"2020-02-19T06:14:55+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/"},"wordCount":949,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/","url":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/","name":"200 000 SITES MENAC\u00c9S D'ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","datePublished":"2020-02-18T06:12:14+00:00","dateModified":"2020-02-19T06:14:55+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/200-000-sites-menaces-dattaque-en-raison-de-la-vulnerabilite-du-plugin-wordpress\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"200 000 SITES MENAC\u00c9S D&rsquo;ATTAQUE EN RAISON DE LA VULN\u00c9RABILIT\u00c9 DU PLUGIN WORDPRESS"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-rW","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1732"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1732\/revisions"}],"predecessor-version":[{"id":1734,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1732\/revisions\/1734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1733"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}