{"id":5011,"date":"2015-05-07T12:24:14","date_gmt":"2015-05-07T10:24:14","guid":{"rendered":"https:\/\/www.combell.com\/fr\/blog\/?p=5011"},"modified":"2015-06-03T15:52:25","modified_gmt":"2015-06-03T13:52:25","slug":"soyez-a-jour-car-une-grave-faille-de-securite-a-ete-detectee-dans-des-plugins-souvent-utilises-avec-wordpress","status":"publish","type":"post","link":"https:\/\/www.combell.com\/fr\/blog\/soyez-a-jour-car-une-grave-faille-de-securite-a-ete-detectee-dans-des-plugins-souvent-utilises-avec-wordpress\/","title":{"rendered":"Soyez \u00e0 jour, car une grave faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 d\u00e9tect\u00e9e dans des plugins souvent utilis\u00e9s avec WordPress"},"content":{"rendered":"<p><strong>De nombreux plugins couramment utilis\u00e9s avec <a title=\"WordPress.com\" href=\"http:\/\/wordpress.com\" target=\"_blank\" rel=\"noopener\">WordPress<\/a> sont vuln\u00e9rables face au cross-site scripting (XSS), qui permet \u00e0 des hackers d\u2019attaquer votre site web. D\u2019apr\u00e8s les estimations, le probl\u00e8me concernerait plus de 400 plugins ! Il est de ce fait important de r\u00e9fl\u00e9chir un instant \u00e0 ce que vous pouvez faire en tant que webmaster pour rester \u00e0 jour.<\/strong><\/p>\n<p>Seraient entre autres infect\u00e9s les plugins courants suivants :<\/p>\n<ul>\n<li>Jetpack<\/li>\n<li>WordPress SEO<\/li>\n<li>Google Analytics by Yoast<\/li>\n<li>All In one SEO<\/li>\n<li>Gravity Forms<\/li>\n<li>Plusieurs Plugins d\u2019Easy Digital Downloads<\/li>\n<li>UpdraftPlus<\/li>\n<li>WP-E-Commerce<\/li>\n<li>WPTouch<\/li>\n<li>Download Monitor<\/li>\n<li>Related Posts pour WordPress<\/li>\n<li>My Calendar<\/li>\n<li>P3 Profiler<\/li>\n<li>Give<\/li>\n<li>Plusieurs produits iThemes, y compris Builder et Exchange<\/li>\n<li>Broken-Link-Checker<\/li>\n<li>Ninja Forms<\/li>\n<\/ul>\n<p>Il est fort probable que vous utilisiez un ou plusieurs de ces plugins, vu qu\u2019ils font partie des plugins les plus utilis\u00e9s avec WordPress. La solution pour vous prot\u00e9ger est assez simple : vous devez vous connecter \u00e0 votre WordPress admin (souvent http:\/\/votreblog.be\/wp-admin) et mettre \u00e0 jour tous les plugins. Si vous utilisez WordPress version 3.9 ou toute version ult\u00e9rieure, il y a de fortes chances que la mise \u00e0 jour ait d\u00e9j\u00e0 \u00e9t\u00e9 effectu\u00e9e automatiquement.<\/p>\n<p>Vous devriez d\u2019ailleurs faire cela r\u00e9guli\u00e8rement, mais nous vous conseillons de le faire d\u00e8s que possible. Il est tr\u00e8s probable que les plugins n\u2019offrent pas encore tous une mise \u00e0 jour ; dans les semaines \u00e0 venir, v\u00e9rifiez donc quotidiennement si de nouvelles mises \u00e0 jour sont disponibles.<\/p>\n<p><strong>Comment r\u00e9soudre le probl\u00e8me ? Plus d\u2019infos ici :<\/strong><\/p>\n<p><a title=\"Security advisory\" href=\"https:\/\/blog.sucuri.net\/2015\/04\/security-advisory-xss-vulnerability-affecting-multiple-wordpress-plugins.html\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.sucuri.net\/2015\/04\/security-advisory-xss-vulnerability-affecting-multiple-wordpress-plugins.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>De nombreux plugins couramment utilis\u00e9s avec WordPress sont vuln\u00e9rables face au cross-site scripting (XSS), qui permet \u00e0 des hackers d\u2019attaquer votre site web. D\u2019apr\u00e8s les estimations, le probl\u00e8me concernerait plus...<\/p>\n","protected":false},"author":5,"featured_media":5012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[67,72,62,63,73,77],"tags":[42,54],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug.jpg",800,400,false],"thumbnail":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug-300x150.jpg",300,150,true],"medium_large":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug.jpg",768,384,false],"large":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug.jpg",800,400,false],"1536x1536":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug.jpg",800,400,false],"2048x2048":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug.jpg",800,400,false],"post-featured":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug-800x290.jpg",800,290,true],"post-featured-opt":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug.jpg",512,256,false],"post-featured-opt-md":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug.jpg",580,290,false],"post-featured-opt-sm":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug.jpg",330,165,false],"post-featured-opt-xs":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug.jpg",256,128,false],"post-most-popular":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/fr\/blog\/files\/2015\/06\/wordpress-security-bug-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Romy","author_link":"https:\/\/www.combell.com\/fr\/blog\/author\/romy\/"},"uagb_comment_info":0,"uagb_excerpt":"De nombreux plugins couramment utilis\u00e9s avec WordPress sont vuln\u00e9rables face au cross-site scripting (XSS), qui permet \u00e0 des hackers d\u2019attaquer votre site web. D\u2019apr\u00e8s les estimations, le probl\u00e8me concernerait plus...","_links":{"self":[{"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/posts\/5011"}],"collection":[{"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/comments?post=5011"}],"version-history":[{"count":1,"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/posts\/5011\/revisions"}],"predecessor-version":[{"id":5013,"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/posts\/5011\/revisions\/5013"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/media\/5012"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/media?parent=5011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/categories?post=5011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/fr\/blog\/wp-json\/wp\/v2\/tags?post=5011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}