{"id":374,"date":"2025-10-29T11:06:33","date_gmt":"2025-10-29T10:06:33","guid":{"rendered":"https:\/\/elcem-com.fr\/?p=374"},"modified":"2025-10-25T11:07:20","modified_gmt":"2025-10-25T09:07:20","slug":"sharepoint-troue","status":"publish","type":"post","link":"https:\/\/elcem-com.fr\/?p=374","title":{"rendered":"Sharepoint trou\u00e9?"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">\u00ab Dis-moi Laurent, c&rsquo;est quoi cette histoire de sharepoint patch\u00e9 et attaqu\u00e9 dans la foul\u00e9e ? \u00bb<br>L&rsquo;histoire est racont\u00e9e ici: https:\/\/korben.info\/histoire-epique-cve-2025-53770-sharepoint-fait-defoncer.html<br>Mais pour faire simple:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dans une comp\u00e9tition de hack, quelqu&rsquo;un est arriv\u00e9 \u00e0 trouer sharepoint en une requ\u00eate.<\/li>\n\n\n\n<li>Microsoft patch deux vuln\u00e9rabilit\u00e9s qui ont permis cette attaque<\/li>\n\n\n\n<li>Mais ce n&rsquo;\u00e9taient pas la root cause de la vuln\u00e9rabilit\u00e9 juste un sympt\u00f4me<br>Des groupes \u00e9tatiques chinois se sont coordonn\u00e9s pour attaquer trois jours apr\u00e8s le patch. Et plut\u00f4t que d&rsquo;exfiltrer les donn\u00e9es, ils ont copi\u00e9 les clefs serveurs.<br>Ainsi ils peuvent revenir quand ils veulent.<br>Donc patchez et renouvelez vos clefs de chiffrements.<br>Est-ce qu&rsquo;on ach\u00e8te un extincteur quand sa maison commence \u00e0 br\u00fbler?<br>Non<br>Alors contactez-moi!<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">BodyGuardInformatique #UnPhareDansLaTourmente #DismoiLaurent<\/h1>\n\n\n\n<p class=\"wp-block-paragraph\">La connaissance des mots conduit \u00e0 la connaissance des choses &#8211; Platon<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ab Dis-moi Laurent, c&rsquo;est quoi cette histoire de sharepoint patch\u00e9 et attaqu\u00e9 dans la foul\u00e9e ? \u00bbL&rsquo;histoire est racont\u00e9e ici: https:\/\/korben.info\/histoire-epique-cve-2025-53770-sharepoint-fait-defoncer.htmlMais pour faire simple: BodyGuardInformatique #UnPhareDansLaTourmente #DismoiLaurent La connaissance des mots conduit \u00e0 la connaissance des choses &#8211; Platon<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"saved_in_kubio":false,"_crdt_document":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-374","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/elcem-com.fr\/index.php?rest_route=\/wp\/v2\/posts\/374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elcem-com.fr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elcem-com.fr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elcem-com.fr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elcem-com.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=374"}],"version-history":[{"count":1,"href":"https:\/\/elcem-com.fr\/index.php?rest_route=\/wp\/v2\/posts\/374\/revisions"}],"predecessor-version":[{"id":375,"href":"https:\/\/elcem-com.fr\/index.php?rest_route=\/wp\/v2\/posts\/374\/revisions\/375"}],"wp:attachment":[{"href":"https:\/\/elcem-com.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elcem-com.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elcem-com.fr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}