{"id":488868,"date":"2024-01-31T09:05:07","date_gmt":"2024-01-31T08:05:07","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=488868"},"modified":"2024-02-15T15:13:17","modified_gmt":"2024-02-15T14:13:17","slug":"alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/","title":{"rendered":"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-23897 : la r\u00e9ponse des produits Stormshield"},"content":{"rendered":"<p><b>Une vuln\u00e9rabilit\u00e9 critique impactant Jenkins, identifi\u00e9e par la r\u00e9f\u00e9rence CVE-2024-23897, vient de voir le jour. Elle obtient un score CVSS v3.1 de 9.8. Il convient de porter une attention particuli\u00e8re \u00e0 cette vuln\u00e9rabilit\u00e9 Jenkins, car de nombreuses preuves de concept sont disponibles publiquement, offrant un fort potentiel d\u2019exploitation par des acteurs malveillants. L\u2019\u00e9quipe Stormshield Customer Security Lab d\u00e9taille les protections fournies par Stormshield.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2>Le contexte de la vuln\u00e9rabilit\u00e9 Jenkins<\/h2>\n<p>La vuln\u00e9rabilit\u00e9 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23897\" target=\"_blank\" rel=\"noopener\">CVE-2024-23897<\/a>\u00a0impacte les versions 2.441 et inf\u00e9rieures de la branche principale de Jenkins, ainsi que les versions 2.426.2 et inf\u00e9rieures de la branche LTS (<em>Long Term Support<\/em>). Cette faille permet de lire des fichiers de mani\u00e8re arbitraire. Cependant, deux cas existent :<\/p>\n<ul>\n<li>Soit l\u2019attaquant n\u2019est pas authentifi\u00e9, auquel cas il ne peut lire que les premi\u00e8res lignes du fichier\u00a0;<\/li>\n<li>Soit l\u2019attaquant dispose d\u2019un compte avec des permissions de lecture seule, auquel cas il peut lire le fichier en entier.<\/li>\n<\/ul>\n<p>Cette vuln\u00e9rabilit\u00e9 Jenkins peut ainsi permettre \u00e0 un attaquant d\u2019acc\u00e9der \u00e0 des fichiers sensibles tels que des mots de passe, des cl\u00e9s SSH, ou encore, dans le cas de Jenkins, du code source. Avec certains secrets en main, l\u2019attaquant peut potentiellement prendre le contr\u00f4le du serveur.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les d\u00e9tails techniques de la vuln\u00e9rabilit\u00e9 Jenkins<\/h2>\n<p>La cause de cette vuln\u00e9rabilit\u00e9 CVE-2024-23897 vient du syst\u00e8me de ligne de commande int\u00e9gr\u00e9 \u00e0 Jenkins. En effet, il est possible, gr\u00e2ce \u00e0 ce moyen, de fournir \u00e0 une commande le chemin d\u2019un fichier et cette derni\u00e8re peut alors utiliser les lignes de ce fichier en tant qu\u2019arguments.<\/p>\n<p>Pour les connaisseurs, cela se fait avec le caract\u00e8re \u2018@\u2019. L\u2019attaquant peut alors utiliser cette technique sur une commande dont il sait qu\u2019elle retourne, en cas d\u2019erreur, l\u2019argument lu et ainsi divulguer le contenu du fichier.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les moyens de protections Stormshield face \u00e0 la vuln\u00e9rabilit\u00e9 Jenkins<\/h2>\n<h3>Protection avec Stormshield Network Security<\/h3>\n<p>Les firewalls Stormshield Network Security (SNS) d\u00e9tectent et bloquent par d\u00e9faut l\u2019exploitation de la CVE-2024-23897, via leur analyse protocolaire :<\/p>\n<ul>\n<li><strong>http:client,99<\/strong>\u00a0: Exploitation of a arbitrary file read vulnerability in Jenkins (CVE-2024-23897)<\/li>\n<\/ul>\n<p>Afin que ces protections soient efficaces, il est n\u00e9cessaire que le flux soit d\u00e9chiffr\u00e9.<\/p>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-233125\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-3.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-232004 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-2.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Recommandations face \u00e0 la vuln\u00e9rabilit\u00e9 Jenkins<\/h3>\n<p>\u00c0 la r\u00e9daction de cet article, un patch de Jenkins est d\u2019ores et d\u00e9j\u00e0 disponible. Il est ainsi fortement recommand\u00e9 de mettre \u00e0 jour le produit en version 2.442 pour la branche principale et en version 2.426.3 pour la branche LTS.<\/p>\n<p>Si ce n\u2019est pas possible d\u2019appliquer la mise \u00e0 jour de suite, le contournement consiste \u00e0 d\u00e9sactiver la ligne de commande pour emp\u00eacher cette attaque via la vuln\u00e9rabilit\u00e9 CVE-2024-23897.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une vuln\u00e9rabilit\u00e9 critique impactant Jenkins, identifi\u00e9e par la r\u00e9f\u00e9rence CVE-2024-23897, vient de voir le jour. Elle obtient un score CVSS v3.1 de 9.8. Il convient de porter une attention particuli\u00e8re \u00e0 cette vuln\u00e9rabilit\u00e9 Jenkins, car de nombreuses preuves de concept sont disponibles publiquement, offrant un&#8230;<\/p>\n","protected":false},"author":83,"featured_media":190179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1503],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[],"class_list":["post-488868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alertes","tag-la-cybersecurite-par-stormshield"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vuln\u00e9rabilit\u00e9 critique Jenkins CVE-2024-23897<\/title>\n<meta name=\"description\" content=\"Alerte de s\u00e9curit\u00e9 Jenkins et la r\u00e9ponse des produits Stormshield. Moyens de protection face \u00e0 la CVE-2024-23897.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln\u00e9rabilit\u00e9 critique Jenkins CVE-2024-23897\" \/>\n<meta property=\"og:description\" content=\"Alerte de s\u00e9curit\u00e9 Jenkins et la r\u00e9ponse des produits Stormshield. Moyens de protection face \u00e0 la CVE-2024-23897.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-31T08:05:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-15T14:13:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stormshield Customer Security Lab\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stormshield Customer Security Lab\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/\"},\"author\":{\"name\":\"Stormshield Customer Security Lab\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"headline\":\"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-23897 : la r\u00e9ponse des produits Stormshield\",\"datePublished\":\"2024-01-31T08:05:07+00:00\",\"dateModified\":\"2024-02-15T14:13:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/\"},\"wordCount\":499,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Alertes\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/\",\"name\":\"Vuln\u00e9rabilit\u00e9 critique Jenkins CVE-2024-23897\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"datePublished\":\"2024-01-31T08:05:07+00:00\",\"dateModified\":\"2024-02-15T14:13:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"description\":\"Alerte de s\u00e9curit\u00e9 Jenkins et la r\u00e9ponse des produits Stormshield. Moyens de protection face \u00e0 la CVE-2024-23897.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"width\":2560,\"height\":1422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-23897 : la r\u00e9ponse des produits Stormshield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\",\"name\":\"Stormshield Customer Security Lab\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"caption\":\"Stormshield Customer Security Lab\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9 critique Jenkins CVE-2024-23897","description":"Alerte de s\u00e9curit\u00e9 Jenkins et la r\u00e9ponse des produits Stormshield. Moyens de protection face \u00e0 la CVE-2024-23897.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/","og_locale":"fr_FR","og_type":"article","og_title":"Vuln\u00e9rabilit\u00e9 critique Jenkins CVE-2024-23897","og_description":"Alerte de s\u00e9curit\u00e9 Jenkins et la r\u00e9ponse des produits Stormshield. Moyens de protection face \u00e0 la CVE-2024-23897.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/","og_site_name":"Stormshield","article_published_time":"2024-01-31T08:05:07+00:00","article_modified_time":"2024-02-15T14:13:17+00:00","og_image":[{"width":2560,"height":1422,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","type":"image\/jpeg"}],"author":"Stormshield Customer Security Lab","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Stormshield Customer Security Lab","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/"},"author":{"name":"Stormshield Customer Security Lab","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"headline":"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-23897 : la r\u00e9ponse des produits Stormshield","datePublished":"2024-01-31T08:05:07+00:00","dateModified":"2024-02-15T14:13:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/"},"wordCount":499,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Alertes"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/","name":"Vuln\u00e9rabilit\u00e9 critique Jenkins CVE-2024-23897","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","datePublished":"2024-01-31T08:05:07+00:00","dateModified":"2024-02-15T14:13:17+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"description":"Alerte de s\u00e9curit\u00e9 Jenkins et la r\u00e9ponse des produits Stormshield. Moyens de protection face \u00e0 la CVE-2024-23897.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","width":2560,"height":1422},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-23897-reponse-produits-stormshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-23897 : la r\u00e9ponse des produits Stormshield"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249","name":"Stormshield Customer Security Lab","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","caption":"Stormshield Customer Security Lab"}}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/488868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=488868"}],"version-history":[{"count":4,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/488868\/revisions"}],"predecessor-version":[{"id":493415,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/488868\/revisions\/493415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/190179"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=488868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=488868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=488868"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=488868"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=488868"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=488868"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=488868"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=488868"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=488868"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=488868"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=488868"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=488868"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=488868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}