{"id":3428,"date":"2019-08-27T08:02:36","date_gmt":"2019-08-27T07:02:36","guid":{"rendered":"https:\/\/werle.pro\/?p=3428"},"modified":"2019-08-27T08:03:28","modified_gmt":"2019-08-27T07:03:28","slug":"ssi-res-big-ip-de-f5-un-grave-defaut-de-securite","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2019\/08\/27\/ssi-res-big-ip-de-f5-un-grave-defaut-de-securite\/","title":{"rendered":"SSI RES &#8211; BIG-IP de F5, un grave d\u00e9faut de s\u00e9curit\u00e9"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3427 alignnone size-full\" src=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/08\/silhouette-construction_1150-83365384772590923399870.jpg?resize=626%2C418&#038;ssl=1\" width=\"626\" height=\"418\" srcset=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/08\/silhouette-construction_1150-83365384772590923399870.jpg?w=626&amp;ssl=1 626w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/08\/silhouette-construction_1150-83365384772590923399870.jpg?resize=200%2C134&amp;ssl=1 200w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/08\/silhouette-construction_1150-83365384772590923399870.jpg?resize=512%2C342&amp;ssl=1 512w\" sizes=\"(max-width: 626px) 100vw, 626px\" data-recalc-dims=\"1\" \/><\/p>\n<div class=\"entry-content\">\n<h4><strong>DataSecurityBreach<\/strong><\/h4>\n<h4><strong>Damien Bancal<\/strong><\/h4>\n<h3>Intrusions : Un chercheur en cybers\u00e9curit\u00e9 a identifi\u00e9 un d\u00e9faut de s\u00e9curit\u00e9 susceptible de transformer des centaines de milliers d\u2019\u00e9quilibreurs de charge en vecteurs de cyber attaques.<\/h3>\n<\/div>\n<p>Des chercheurs en <a href=\"https:\/\/www.datasecuritybreach.fr\/?s=cybers%C3%A9curit%C3%A9\" target=\"_blank\" rel=\"noopener noreferrer\">cybers\u00e9curit\u00e9<\/a> invitent les organisations utilisant l\u2019\u00e9quilibreur de charge BIG-IP de F5 Networks, \u00e0 rem\u00e9dier aux probl\u00e8mes de s\u00e9curit\u00e9 pos\u00e9s par plusieurs configurations.<\/p>\n<p><strong>BIG-IP est notamment populaire aupr\u00e8s des gouvernements, des banques et d\u2019autres grandes entreprises. Mal configur\u00e9, cet \u00e9quilibreur de charge peut servir de porte d\u2019entr\u00e9e pour les pirates informatiques.<\/strong> Ces derniers peuvent alors s\u2019infiltrer sur les r\u00e9seaux et effectuer de nombreuses attaques contre les entreprises et particuliers utilisant les services web g\u00e9r\u00e9s par le produit corrompu.<\/p>\n<p>Le d\u00e9faut de s\u00e9curit\u00e9 r\u00e9side dans le langage de programmation Tcl utilis\u00e9 pour d\u00e9finir les r\u00e8gles iRules (la fonctionnalit\u00e9 utilis\u00e9e par BIG-IP pour diriger le trafic web entrant). Certaines pratiques de codage permettent aux hackers d\u2019injecter des commandes Tcl arbitraires pouvant \u00eatre ex\u00e9cut\u00e9es dans le script Tcl cible.<\/p>\n<p><a href=\"https:\/\/www.datasecuritybreach.fr\/big-ip-de-f5-un-grave-defaut-de-securite-peut-donner-lieu-a-des-intrusions-informatiques\/\">https:\/\/www.datasecuritybreach.fr\/big-ip-de-f5-un-grave-defaut-de-securite-peut-donner-lieu-a-des-intrusions-informatiques\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DataSecurityBreach Damien Bancal Intrusions : Un chercheur en cybers\u00e9curit\u00e9 a identifi\u00e9 un d\u00e9faut de s\u00e9curit\u00e9 susceptible de transformer des centaines de milliers d\u2019\u00e9quilibreurs de charge en vecteurs de cyber attaques. Des chercheurs en cybers\u00e9curit\u00e9 invitent les organisations utilisant l\u2019\u00e9quilibreur de charge BIG-IP de F5 Networks, \u00e0 rem\u00e9dier aux probl\u00e8mes de s\u00e9curit\u00e9 pos\u00e9s par plusieurs configurations. &#8230; <a title=\"SSI RES &#8211; BIG-IP de F5, un grave d\u00e9faut de s\u00e9curit\u00e9\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2019\/08\/27\/ssi-res-big-ip-de-f5-un-grave-defaut-de-securite\/\" aria-label=\"Read more about SSI RES &#8211; BIG-IP de F5, un grave d\u00e9faut de s\u00e9curit\u00e9\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-Ti","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3428"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=3428"}],"version-history":[{"count":2,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3428\/revisions"}],"predecessor-version":[{"id":3430,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3428\/revisions\/3430"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=3428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=3428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=3428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}