{"id":5011,"date":"2023-05-13T05:00:00","date_gmt":"2023-05-13T03:00:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=5011"},"modified":"2023-05-17T08:03:50","modified_gmt":"2023-05-17T06:03:50","slug":"des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/","title":{"rendered":"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&rsquo;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&rsquo;UN EXPLOIT POC"},"content":{"rendered":"\n<p>Des acteurs de la menace exploitent activement une vuln\u00e9rabilit\u00e9 qui a \u00e9t\u00e9 corrig\u00e9e r\u00e9cemment. La faille se trouvait dans le plugin WordPress Advanced Custom Fields. La faille a \u00e9t\u00e9 exploit\u00e9e environ 24 heures apr\u00e8s la r\u00e9v\u00e9lation d&rsquo;un exploit de preuve de concept (PoC). Les acteurs de la menace semblent avoir rapidement exploit\u00e9 la faille avant qu&rsquo;un correctif ne soit publi\u00e9.<\/p>\n\n\n\n<p><strong>Microsoft cible une faille dans un plugin WordPress<\/strong><\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 en question est r\u00e9pertori\u00e9e sous le nom de CVE-2023-30777. La faille de haute gravit\u00e9 a \u00e9t\u00e9 \u00e9tiquet\u00e9e comme une vuln\u00e9rabilit\u00e9 XSS (cross-site scripting) r\u00e9fl\u00e9chie qui a permis \u00e0 des hackers non autoris\u00e9s de voler des informations sensibles car ils ont \u00e9galement escalad\u00e9 les privil\u00e8ges qui existent au sein des sites Web WordPress.<\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 en question a \u00e9t\u00e9 d\u00e9tect\u00e9e par Patchstack, une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9 des sites web. La faille a \u00e9t\u00e9 d\u00e9tect\u00e9e le 2 mai 2023 et a \u00e9t\u00e9 <strong><a href=\"https:\/\/blog.koddos.net\/hackers-exploit-ruckus-rce-vulnerability-to-launch-ddos-attacks\/\">signal\u00e9e<\/a><\/strong> en m\u00eame temps qu&rsquo;un exploit de preuve de concept r\u00e9alis\u00e9 le 5 mai. L&rsquo;exploitation a eu lieu apr\u00e8s que le fournisseur du plugin a publi\u00e9 une mise \u00e0 jour de s\u00e9curit\u00e9 en publiant une nouvelle version 6.1.6.<\/p>\n\n\n\n<p>Le groupe d&rsquo;intelligence de s\u00e9curit\u00e9 d&rsquo;Akamai (SIG) a publi\u00e9 un <strong><a href=\"https:\/\/patchstack.com\/articles\/reflected-xss-in-advanced-custom-fields-plugins-affecting-2-million-sites\/\">rapport<\/a> <\/strong>indiquant qu&rsquo;il avait d\u00e9tect\u00e9 la vuln\u00e9rabilit\u00e9 exploit\u00e9e par les hackers. L&rsquo;entreprise de cybers\u00e9curit\u00e9 a d\u00e9clar\u00e9 que l&rsquo;exploitation semblait avoir commenc\u00e9 le 6 mai 2023. Les chercheurs ont d\u00e9tect\u00e9 un nombre consid\u00e9rable de comportements d&rsquo;analyse et d&rsquo;exploitation par le biais d&rsquo;un \u00e9chantillon de code fourni dans le rapport Patchstack.<\/p>\n\n\n\n<p>Le rapport d&rsquo;Akamai indique aussi que le SIG d&rsquo;Akamai a analys\u00e9 les donn\u00e9es d&rsquo;attaque XSS et a identifi\u00e9 que les exploits ont commenc\u00e9 dans les 24 heures qui ont suivi la publication de l&rsquo;exploit PoC. Le rapport pr\u00e9cise en outre que l&rsquo;une des particularit\u00e9s de la requ\u00eate est que le hacker a copi\u00e9 et utilis\u00e9 un exemple de code de Patchstack qui \u00e9tait s\u00e9curis\u00e9 \u00e0 partir de l&rsquo;article.<\/p>\n\n\n\n<p>\u00ab\u00a0L&rsquo;activit\u00e9 s&rsquo;est \u00e9tendue \u00e0 tous les secteurs verticaux sans distinction. Cette ampleur de l&rsquo;activit\u00e9 et l&rsquo;absence totale d&rsquo;effort pour cr\u00e9er un nouveau code d&rsquo;exploitation nous indiquent que l&rsquo;acteur de la menace n&rsquo;est pas sophistiqu\u00e9. L&rsquo;acteur recherchait des sites vuln\u00e9rables et tentait d&rsquo;exploiter une cible facile\u00a0\u00bb, indique le rapport d&rsquo;Akamai.<\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 a une port\u00e9e consid\u00e9rable, ce qui accro\u00eet la possibilit\u00e9 que l&rsquo;auteur de la menace ait caus\u00e9 des ravages consid\u00e9rables. Plus de 1,4 million de <strong><a href=\"https:\/\/wordpress.org\/plugins\/advanced-custom-fields\/advanced\/\">sites web<\/a><\/strong> utilisent le plugin WordPress compromis, et ils n&rsquo;ont pas encore \u00e9t\u00e9 mis \u00e0 niveau vers la derni\u00e8re version. Les statistiques relatives \u00e0 la plateforme wordpress.org montrent que les acteurs de la menace disposent d&rsquo;une surface d&rsquo;attaque massive qu&rsquo;ils peuvent explorer pour causer des d\u00e9g\u00e2ts.<\/p>\n\n\n\n<p><strong>La vuln\u00e9rabilit\u00e9 XSS<\/strong><\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 XSS n\u00e9cessite qu&rsquo;un utilisateur soit connect\u00e9 au site pour que l&rsquo;acteur de la menace puisse y acc\u00e9der. L&rsquo;utilisateur ayant acc\u00e8s au plugin ex\u00e9cutera un code malveillant dans son navigateur. Ce code permettra \u00e0 l&rsquo;acteur de la menace d&rsquo;obtenir un acc\u00e8s privil\u00e9gi\u00e9 \u00e0 cette plateforme.<\/p>\n\n\n\n<p>Les scans malveillants effectu\u00e9s par les acteurs de la menace montrent \u00e9galement que le facteur d&rsquo;att\u00e9nuation ne dissuade pas les activit\u00e9s malveillantes. Les hackers \u00e0 l&rsquo;origine de l&rsquo;exploit semblent convaincus qu&rsquo;ils peuvent \u00e9viter d&rsquo;\u00eatre d\u00e9tect\u00e9s par les syst\u00e8mes de s\u00e9curit\u00e9 mis en place gr\u00e2ce \u00e0 des astuces et \u00e0 l&rsquo;ing\u00e9nierie sociale.<\/p>\n\n\n\n<p>Cet exploit fonctionne sur les configurations par d\u00e9faut des versions de plugins concern\u00e9es. L&rsquo;exploitation augmente les chances de succ\u00e8s des acteurs de la menace sans les obliger \u00e0 faire plus d&rsquo;efforts de leur c\u00f4t\u00e9 pour poursuivre leurs activit\u00e9s.<\/p>\n\n\n\n<p>Les administrateurs du site WordPress ont d\u00e9clar\u00e9 que ceux qui utilisent les plugins WordPress vuln\u00e9rables doivent appliquer imm\u00e9diatement le correctif disponible afin de s&rsquo;assurer que leurs appareils ne sont pas compromis. La sortie d&rsquo;un correctif pour la faille garantira que l&rsquo;utilisateur sera prot\u00e9g\u00e9 contre l&rsquo;activit\u00e9 en cours qui implique le balayage et l&rsquo;exploitation.<\/p>\n\n\n\n<p>La recommandation \u00e9mise par l&rsquo;entreprise est d&rsquo;installer les mises \u00e0 jour pour les plugins gratuits et pro \u00ab\u00a0Advanced Custom Fields\u00a0\u00bb vers la version 5.12.6 qui a \u00e9t\u00e9 r\u00e9troport\u00e9e. La version 6.1.6 est aussi concern\u00e9e.<\/p>\n\n\n\n<p>Ce n&rsquo;est pas le premier plugin WordPress exploit\u00e9 par des acteurs malveillants. Des hackers ont activement <strong><a href=\"https:\/\/blog.nintechnet.com\/high-severity-vulnerability-fixed-in-wordpress-elementor-pro-plugin\/\">exploit\u00e9<\/a> <\/strong>une vuln\u00e9rabilit\u00e9 de haute s\u00e9v\u00e9rit\u00e9 dans le plugin WordPress Elementor Pro, leader sur le march\u00e9, pour installer des portes d\u00e9rob\u00e9es sur des sites web.<\/p>\n\n\n\n<p>Elementor Pro est un plugin de construction de pages WordPress. Le plugin permet aux utilisateurs de cr\u00e9er facilement des sites web d&rsquo;apparence professionnelle sans comprendre les techniques avanc\u00e9es utilis\u00e9es par les hackers, comme comprendre comment coder, mettre en avant le glisser-d\u00e9poser, construire un th\u00e8me, une collection de mod\u00e8les, supporter un widget personnalis\u00e9, et avoir un constructeur WooCommerce pour les boutiques en ligne.<\/p>\n\n\n\n<p>La faille en question a \u00e9t\u00e9 d\u00e9tect\u00e9e par un chercheur de NinTechNet, Jerome Bruandet. Le chercheur a d\u00e9tect\u00e9 la faille le 18 mars 2023 et a partag\u00e9 des d\u00e9tails techniques sur la fa\u00e7on dont la vuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e lorsqu&rsquo;elle a \u00e9t\u00e9 install\u00e9e avec WooCommerce. Le probl\u00e8me affecte la version 3.11.6 et les versions pr\u00e9c\u00e9dentes. Il permet aux clients et aux membres du site de modifier les param\u00e8tres du site et de fermer la prise de contr\u00f4le du site.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des acteurs de la menace exploitent activement une vuln\u00e9rabilit\u00e9 qui a \u00e9t\u00e9 corrig\u00e9e r\u00e9cemment. La faille se trouvait dans le plugin WordPress Advanced Custom Fields. La faille a \u00e9t\u00e9 exploit\u00e9e environ 24 heures apr\u00e8s la r\u00e9v\u00e9lation d&rsquo;un exploit de preuve de concept (PoC). Les acteurs de la menace semblent avoir rapidement exploit\u00e9 la faille avant &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&rsquo;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&rsquo;UN EXPLOIT POC<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1494,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-5011","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&#039;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&#039;UN EXPLOIT POC - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&#039;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&#039;UN EXPLOIT POC - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Des acteurs de la menace exploitent activement une vuln\u00e9rabilit\u00e9 qui a \u00e9t\u00e9 corrig\u00e9e r\u00e9cemment. La faille se trouvait dans le plugin WordPress Advanced Custom Fields. La faille a \u00e9t\u00e9 exploit\u00e9e environ 24 heures apr\u00e8s la r\u00e9v\u00e9lation d&rsquo;un exploit de preuve de concept (PoC). Les acteurs de la menace semblent avoir rapidement exploit\u00e9 la faille avant &hellip; Continue reading DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&rsquo;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&rsquo;UN EXPLOIT POC\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-13T03:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T06:03:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&rsquo;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&rsquo;UN EXPLOIT POC\",\"datePublished\":\"2023-05-13T03:00:00+00:00\",\"dateModified\":\"2023-05-17T06:03:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/\"},\"wordCount\":1001,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/\",\"name\":\"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D'UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D'UN EXPLOIT POC - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2023-05-13T03:00:00+00:00\",\"dateModified\":\"2023-05-17T06:03:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&rsquo;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&rsquo;UN EXPLOIT POC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D'UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D'UN EXPLOIT POC - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/","og_locale":"fr_FR","og_type":"article","og_title":"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D'UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D'UN EXPLOIT POC - Blog KoDDoS","og_description":"Des acteurs de la menace exploitent activement une vuln\u00e9rabilit\u00e9 qui a \u00e9t\u00e9 corrig\u00e9e r\u00e9cemment. La faille se trouvait dans le plugin WordPress Advanced Custom Fields. La faille a \u00e9t\u00e9 exploit\u00e9e environ 24 heures apr\u00e8s la r\u00e9v\u00e9lation d&rsquo;un exploit de preuve de concept (PoC). Les acteurs de la menace semblent avoir rapidement exploit\u00e9 la faille avant &hellip; Continue reading DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&rsquo;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&rsquo;UN EXPLOIT POC","og_url":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2023-05-13T03:00:00+00:00","article_modified_time":"2023-05-17T06:03:50+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&rsquo;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&rsquo;UN EXPLOIT POC","datePublished":"2023-05-13T03:00:00+00:00","dateModified":"2023-05-17T06:03:50+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/"},"wordCount":1001,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/","url":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/","name":"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D'UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D'UN EXPLOIT POC - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg?fit=825%2C510&ssl=1","datePublished":"2023-05-13T03:00:00+00:00","dateModified":"2023-05-17T06:03:50+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-ciblent-la-vulnerabilite-dun-plugin-wordpress-apres-la-publication-dun-exploit-poc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"DES HACKERS CIBLENT LA VULN\u00c9RABILIT\u00c9 D&rsquo;UN PLUGIN WORDPRESS APR\u00c8S LA PUBLICATION D&rsquo;UN EXPLOIT POC"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/12\/Researchers-say-WordPress-Plugins-makes-affected-sites-Vulnerable-to-Attacks.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-1iP","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/5011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=5011"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/5011\/revisions"}],"predecessor-version":[{"id":5012,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/5011\/revisions\/5012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1494"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=5011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=5011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=5011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}