{"id":558068,"date":"2024-08-12T12:45:19","date_gmt":"2024-08-12T11:45:19","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=558068"},"modified":"2024-08-13T09:00:38","modified_gmt":"2024-08-13T08:00:38","slug":"alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/","title":{"rendered":"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-36401 : la r\u00e9ponse des produits Stormshield"},"content":{"rendered":"<p><strong>Une vuln\u00e9rabilit\u00e9 critique de type RCE (Remote Code Execution) et impactant le logiciel libre GeoServer vient de voir le jour. Elle est identifi\u00e9e sous la r\u00e9f\u00e9rence CVE-2024-36401 et obtient un score CVSS v3.1 de 9,8.<\/strong><\/p>\n<p>Il convient de porter une attention particuli\u00e8re \u00e0 cette vuln\u00e9rabilit\u00e9, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-36401\" target=\"_blank\" rel=\"noopener\">CVE-2024-36401<\/a>, car des preuves de concept sont disponibles publiquement et facilement exploitable.<\/p>\n<p>&nbsp;<\/p>\n<h2>Le vecteur initial de la vuln\u00e9rabilit\u00e9 Jenkins<\/h2>\n<p><strong>La vuln\u00e9rabilit\u00e9 permet \u00e0 un attaquant non-authentifi\u00e9 de d\u00e9clencher une ex\u00e9cution arbitraire de code sur le serveur GeoServer.<\/strong> Elle permet donc d\u2019ex\u00e9cuter un reverse shell \u00e0 distance, et de prendre le contr\u00f4le du serveur.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les d\u00e9tails techniques de la vuln\u00e9rabilit\u00e9 Jenkins<\/h2>\n<p>L\u2019API sous-jacent de GeoServer n\u2019op\u00e8re pas de v\u00e9rification de s\u00e9curit\u00e9 sur les valeurs de certains param\u00e8tres, ce qui peut conduire \u00e0 une interpr\u00e9tation de code java envoy\u00e9 par requ\u00eate HTTP. Ce code h\u00e9ritera du contexte d\u2019ex\u00e9cution du serveur GeoServer.<\/p>\n<p>&nbsp;<\/p>\n<h2>La mod\u00e9lisation de l'attaque avec MITRE ATT&amp;CK<\/h2>\n<h3>MITRE ATT&amp;CK<\/h3>\n<ul>\n<li>T1190 (Exploit Public-Facing Application)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Les moyens de protections avec Stormshield Network Security face \u00e0 la vuln\u00e9rabilit\u00e9 Jenkins<\/h2>\n<h3>Protection face \u00e0 la CVE-2024-36401<\/h3>\n<p>Les firewalls Stormshield Network Security (SNS) d\u00e9tectent et bloquent par d\u00e9faut l\u2019exploitation de la CVE-2024-36401 via la signature :<\/p>\n<ul>\n<li><strong>http:client.102 : Exploitation d'une ex\u00e9cution de commande \u00e0 distance dans GeoServer (CVE-2024-36401)<\/strong><\/li>\n<\/ul>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-233125\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-3.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Recommandations face \u00e0 la vuln\u00e9rabilit\u00e9 Jenkins<\/h3>\n<p>Il est ainsi fortement recommand\u00e9 de mettre \u00e0 jour l\u2019applicatif GeoServer vers une des versions suivantes :<\/p>\n<ul>\n<li>24.4<\/li>\n<li>25.2<\/li>\n<li>23.6<\/li>\n<\/ul>\n<p>La d\u00e9sactivation du service WFS permet \u00e9galement de se prot\u00e9ger contre cette exploitation de vuln\u00e9rabilit\u00e9 CVE-2024-36401.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une vuln\u00e9rabilit\u00e9 critique de type RCE (Remote Code Execution) et impactant le logiciel libre GeoServer vient de voir le jour. Elle est identifi\u00e9e sous la r\u00e9f\u00e9rence CVE-2024-36401 et obtient un score CVSS v3.1 de 9,8. Il convient de porter une attention particuli\u00e8re \u00e0 cette vuln\u00e9rabilit\u00e9,&#8230;<\/p>\n","protected":false},"author":83,"featured_media":190179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1503],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[],"class_list":["post-558068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alertes","tag-la-cybersecurite-par-stormshield"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vuln\u00e9rabilit\u00e9 Jenkins sur le Serveur Geoserver | CVE-2024-36401<\/title>\n<meta name=\"description\" content=\"Alerte de s\u00e9curit\u00e9 sur le serveur Geoserver Jenkins et moyens de protection Stormshield Network Security face \u00e0 la CVE-2024-36401.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln\u00e9rabilit\u00e9 Jenkins sur le Serveur Geoserver | CVE-2024-36401\" \/>\n<meta property=\"og:description\" content=\"Alerte de s\u00e9curit\u00e9 sur le serveur Geoserver Jenkins et moyens de protection Stormshield Network Security face \u00e0 la CVE-2024-36401.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-12T11:45:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-13T08:00:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stormshield Customer Security Lab\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stormshield Customer Security Lab\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/\"},\"author\":{\"name\":\"Stormshield Customer Security Lab\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"headline\":\"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-36401 : la r\u00e9ponse des produits Stormshield\",\"datePublished\":\"2024-08-12T11:45:19+00:00\",\"dateModified\":\"2024-08-13T08:00:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/\"},\"wordCount\":318,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Alertes\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/\",\"name\":\"Vuln\u00e9rabilit\u00e9 Jenkins sur le Serveur Geoserver | CVE-2024-36401\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"datePublished\":\"2024-08-12T11:45:19+00:00\",\"dateModified\":\"2024-08-13T08:00:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"description\":\"Alerte de s\u00e9curit\u00e9 sur le serveur Geoserver Jenkins et moyens de protection Stormshield Network Security face \u00e0 la CVE-2024-36401.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"width\":2560,\"height\":1422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-36401 : la r\u00e9ponse des produits Stormshield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\",\"name\":\"Stormshield Customer Security Lab\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"caption\":\"Stormshield Customer Security Lab\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9 Jenkins sur le Serveur Geoserver | CVE-2024-36401","description":"Alerte de s\u00e9curit\u00e9 sur le serveur Geoserver Jenkins et moyens de protection Stormshield Network Security face \u00e0 la CVE-2024-36401.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/","og_locale":"fr_FR","og_type":"article","og_title":"Vuln\u00e9rabilit\u00e9 Jenkins sur le Serveur Geoserver | CVE-2024-36401","og_description":"Alerte de s\u00e9curit\u00e9 sur le serveur Geoserver Jenkins et moyens de protection Stormshield Network Security face \u00e0 la CVE-2024-36401.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/","og_site_name":"Stormshield","article_published_time":"2024-08-12T11:45:19+00:00","article_modified_time":"2024-08-13T08:00:38+00:00","og_image":[{"width":2560,"height":1422,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","type":"image\/jpeg"}],"author":"Stormshield Customer Security Lab","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Stormshield Customer Security Lab","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/"},"author":{"name":"Stormshield Customer Security Lab","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"headline":"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-36401 : la r\u00e9ponse des produits Stormshield","datePublished":"2024-08-12T11:45:19+00:00","dateModified":"2024-08-13T08:00:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/"},"wordCount":318,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Alertes"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/","name":"Vuln\u00e9rabilit\u00e9 Jenkins sur le Serveur Geoserver | CVE-2024-36401","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","datePublished":"2024-08-12T11:45:19+00:00","dateModified":"2024-08-13T08:00:38+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"description":"Alerte de s\u00e9curit\u00e9 sur le serveur Geoserver Jenkins et moyens de protection Stormshield Network Security face \u00e0 la CVE-2024-36401.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","width":2560,"height":1422},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jenkins-cve-2024-36401-reponse-des-produits-stormshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Alerte de s\u00e9curit\u00e9 Jenkins CVE-2024-36401 : la r\u00e9ponse des produits Stormshield"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249","name":"Stormshield Customer Security Lab","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","caption":"Stormshield Customer Security Lab"}}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/558068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=558068"}],"version-history":[{"count":5,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/558068\/revisions"}],"predecessor-version":[{"id":558078,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/558068\/revisions\/558078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/190179"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=558068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=558068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=558068"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=558068"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=558068"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=558068"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=558068"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=558068"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=558068"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=558068"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=558068"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=558068"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=558068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}