{"id":2626,"date":"2021-12-13T11:51:21","date_gmt":"2021-12-13T11:51:21","guid":{"rendered":"https:\/\/locaterisk.com\/?p=2626"},"modified":"2025-08-08T07:26:03","modified_gmt":"2025-08-08T07:26:03","slug":"sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/fr\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","title":{"rendered":"Vuln\u00e9rabilit\u00e9 Log4j - D\u00e9couvrez lesquels de vos serveurs sont affect\u00e9s"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Retour au blog                <a href=\"https:\/\/locaterisk.com\/fr\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Vuln\u00e9rabilit\u00e9 Log4j - D\u00e9couvrez lesquels de vos serveurs sont affect\u00e9s<\/h1>\r\n            <p class=\"paragraph\">L'Office f\u00e9d\u00e9ral allemand de la s\u00e9curit\u00e9 des technologies de l'information (BSI) a d\u00e9cr\u00e9t\u00e9 samedi soir le niveau d'alerte rouge. L'exploitation de la faille de s\u00e9curit\u00e9 log4j est tr\u00e8s simple. Les attaques sont d\u00e9j\u00e0 en cours. Ne perdez pas de temps et v\u00e9rifiez la s\u00e9curit\u00e9 de vos syst\u00e8mes.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"571\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-1024x571.jpg\" alt=\"Das Netzt brennt \u2013 Sicherheitsl\u00fccke im Java-Logging log4j\" class=\"wp-image-2627\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-1024x571.jpg 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-300x167.jpg 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-768x428.jpg 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash-18x10.jpg 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Photo by Arnau Soler on Unsplash<\/figcaption><\/figure><\/div>\n\n<h3>Scanner de vuln\u00e9rabilit\u00e9 Log4Shell pour une v\u00e9rification rapide<\/h3>\n<p>Le scanner LocateRisk Log4Shell identifie tr\u00e8s rapidement la vuln\u00e9rabilit\u00e9 CVE-2021-44228 dans les applications web accessibles. Le logiciel fonctionne sous les syst\u00e8mes d'exploitation les plus courants - il est donc \u00e9galement possible d'analyser des syst\u00e8mes dans le r\u00e9seau interne.<\/p>\n<p><b>Pourquoi le scanner n'est-il pas inclus dans le scan LocateRisk ?<\/b> <span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">De notre point de vue, le scan ne peut pas \u00eatre cat\u00e9goris\u00e9 comme \"non invasif\", car il entra\u00eene une augmentation de la charge des requ\u00eates. Le scanneur place la cha\u00eene JNDI dans les en-t\u00eates, l'agent utilisateur et les param\u00e8tres URL les plus divers. Un plantage du syst\u00e8me est peu probable, mais ne peut pas \u00eatre exclu.<\/span><\/p>\n<p><b>Important : seuls les syst\u00e8mes pour lesquels un consentement \u00e0 un scan invasif a \u00e9t\u00e9 donn\u00e9 seront examin\u00e9s ! <\/b><\/p>\n<p><b>Comment utiliser l'analyseur Log4Shell ?<br \/><\/b><span style=\"font-weight: 400;\">Comme donn\u00e9es d'entr\u00e9e pour l'outil d'analyse <\/span><span style=\"font-weight: 400;\">une liste de domaines \/ IP s\u00e9par\u00e9s par des lignes est n\u00e9cessaire. Les ports et les protocoles sont compl\u00e9t\u00e9s automatiquement par le logiciel. <\/span><span style=\"font-weight: 400;\">La liste des syst\u00e8mes issue du scan LocateRisk constitue un premier point de d\u00e9part.&nbsp;<\/span><\/p>\n<p><strong>Comment \u00e7a marche<\/strong><br \/>1. <span class=\"s1\">Inscrire les noms de domaine et les adresses IP \u00e0 contr\u00f4ler dans le fichier \"hosts.txt\" du r\u00e9pertoire de l'application. Il n'est pas possible d'enregistrer des plages IP.<br \/><\/span><span class=\"s1\">2. ex\u00e9cuter l'application.<br \/><\/span><span class=\"s1\">3. vous trouverez les r\u00e9sultats sur la console ainsi que dans le fichier Results dans le r\u00e9pertoire de l'application.<\/span><\/p>\n<p>Vous \u00eates int\u00e9ress\u00e9 par cette solution ? Alors envoyez un message \u00e0 : sales@LocateRisk.com<\/p>\n<p><strong>Remarque<\/strong><br \/>LocateRisk n'est pas responsable des dommages et des d\u00e9penses occasionn\u00e9s par les scans et les vuln\u00e9rabilit\u00e9s non trouv\u00e9es. Il s'agit uniquement d'un contr\u00f4le rapide, ce qui signifie qu'il n'y a pas de test adapt\u00e9 \u00e0 l'application concern\u00e9e. L'outil est mis \u00e0 disposition de mani\u00e8re transitoire. Nous d\u00e9sactiverons l'infrastructure correspondante dans quelques semaines.<\/p>\n<p>Comme nous ne pouvons pas garantir que chaque Log4J et la faille Log4Shell qui l'accompagne seront trouv\u00e9s, nous recommandons de se connecter \u00e0 chaque syst\u00e8me sur lequel des applications Java sont ex\u00e9cut\u00e9es et de suivre \u00e9galement ces 5 \u00e9tapes :<\/p>\n<h3><b>Pour savoir si et o\u00f9 vous utilisez la biblioth\u00e8que Java Log4j<\/b><\/h3>\n<p><span style=\"font-weight: 400;\"><strong>\u00c9tape 1<\/strong><br \/>Ouvrez votre derni\u00e8re analyse de s\u00e9curit\u00e9 sur la plateforme LocateRisk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>\u00c9tape 2<\/strong><br \/>Allez dans la liste \"D\u00e9tails pour les professionnels\" et s\u00e9lectionnez le filtre de cat\u00e9gorie \"App\" pour le rapport.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>\u00c9tape 3<\/strong><br \/>Parcourez les r\u00e9sultats en utilisant la recherche ci-contre pour les applications JAVA et TOMCAT ou pour les applications concern\u00e9es ci-dessous.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>\u00c9tape 4<\/strong><br \/>Connectez-vous sur les serveurs correspondants. Une utilisation \u00e9lev\u00e9e du CPU indique que des crypto-miners sont \u00e9ventuellement install\u00e9s.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>\u00c9tape 5<\/strong><br \/>Prenez toutes les applications JAVA (fichiers JAR et Tomcat) que vous trouvez sur les serveurs ci-dessus et v\u00e9rifiez-les sur Github dans l'outil suivant <br \/><a href=\"https:\/\/github.com\/logpresso\/CVE-2021-44228-Scanner\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228-Scanner<\/a><\/span><span style=\"font-weight: 400;\"> ou sur <a href=\"https:\/\/github.com\/hillu\/local-log4j-vuln-scanner\" target=\"_blank\" rel=\"noopener\">local-log4j-vuln-scanner<\/a>.<\/span><span style=\"font-weight: 400;\"><br \/>Vous saurez imm\u00e9diatement si le point faible se trouve dans l'application et pourrez y rem\u00e9dier directement. <\/span><\/p>\n<p>Vous obtiendrez plus d'informations sur la faille et sa correction directement aupr\u00e8s du <a href=\"http:\/\/Mehr Vous trouverez des informations sur la faille et sa correction aupr\u00e8s du BSI : https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2021\/2021-549032-10F2.pdf?__blob=publicationFile&amp;v=3\" target=\"_blank\" rel=\"noopener\" data-wplink-url-error=\"true\">BSI<\/a><\/p>\n<p><b>L'\u00e9quipe LocateRisk travaille d'arrache-pied pour inclure les applications concern\u00e9es dans l'analyse des risques et mettra \u00e0 jour la liste encore incompl\u00e8te en fonction de chaque nouveau cas signal\u00e9.<\/b><\/p>\n<h3><b>Produits concern\u00e9s par la vuln\u00e9rabilit\u00e9 Log4j<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Pour la plupart des produits, il s'agit d'applications qui utilisent Java dans leur infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Apache Struts2<br \/><\/span><span style=\"font-weight: 400;\">Apache Tomcat<br \/><\/span><span style=\"font-weight: 400;\">Apache Spark<br \/><\/span><span style=\"font-weight: 400;\">Apache Solr<br \/><\/span><span style=\"font-weight: 400;\">Apache Druid<br \/><\/span><span style=\"font-weight: 400;\">Apache Flink<br \/><\/span><span style=\"font-weight: 400;\">ElasticSearch<br \/><\/span><span style=\"font-weight: 400;\">flume<br \/><\/span><span style=\"font-weight: 400;\">Apache Dubbo<br \/><\/span><span style=\"font-weight: 400;\">Logstash<br \/><\/span><span style=\"font-weight: 400;\">Kafka<br \/><\/span><span style=\"font-weight: 400;\">IBM Qradar SIEM<br \/><\/span><span style=\"font-weight: 400;\">VMWare<br \/><\/span><span style=\"font-weight: 400;\">NetApp<\/span><span style=\"font-weight: 400;\">C<br \/>Cisco, F5<br \/><\/span><span style=\"font-weight: 400;\">Citrix<br \/><\/span><span style=\"font-weight: 400;\">Noir de carbone<br \/><\/span><span style=\"font-weight: 400;\">Imperva<br \/><\/span><span style=\"font-weight: 400;\">Jenkins<br \/><\/span><span style=\"font-weight: 400;\">McAfee<br \/><\/span><span style=\"font-weight: 400;\">Oracle<br \/><\/span><span style=\"font-weight: 400;\">Webex<br \/><\/span><span style=\"font-weight: 400;\">R\u00e9seaux Palo-Alto<br \/><\/span><span style=\"font-weight: 400;\">Pulse Secure<\/span><\/p>\n<p>Vous trouverez une liste des applications avec les sources correspondantes sur <a href=\"https:\/\/github.com\/authomize\/log4j-log4shell-affected\/blob\/main\/affected_components.md\" target=\"_blank\" rel=\"noopener\">GitHub<\/a><\/p>\n<h3>La mise \u00e0 disposition de l'analyseur Log4Shell suscite un grand int\u00e9r\u00eat<\/h3>\n<p><strong>Nous sommes heureux de pouvoir aider de nombreux partenaires et clients avec le scanneur Log4Shell. Les retours aimables et les pr\u00e9cieuses suggestions d'extension nous confortent dans notre action !&nbsp;<\/strong><\/p>\n<p>\"Merci beaucoup pour la bonne collaboration ! J'ai recommand\u00e9 LocateRisk-Scanner \u00e0 mes clients. Nous profitons tous de cet outil\".<\/p>\n<p>\"Nos syst\u00e8mes sont d\u00e9j\u00e0 patch\u00e9s. Bien s\u00fbr, nous aimerions quand m\u00eame qu'ils nous donnent acc\u00e8s \u00e0 l'outil d'analyse afin que nous puissions l'examiner de plus pr\u00e8s \u00e0 l'occasion\".<\/p>\n<p>\"J'ai certes d\u00e9j\u00e0 scann\u00e9 notre infrastructure avec divers outils, mais une fois de plus ne fait jamais de mal \ud83d\ude0a\".<\/p>\n<p>\"Notre responsable de la protection des donn\u00e9es vient de m'informer que vous offrez un outil d'analyse gratuit pour la faille de s\u00e9curit\u00e9 Log4Shell. J'aimerais beaucoup le tester et l'utiliser pour v\u00e9rifier nos syst\u00e8mes internes\".<\/p>\n<p>\"Nous sommes ravis du logiciel...\"<\/p>\n<p>\"Bonjour \u00e0 tous. Veuillez m'envoyer l'outil d'analyse. Merci d'avance\".<\/p>\n<p>\"Bonjour \u00e0 tous, nous avons volontiers cet outil \ud83d\ude42\"<\/p>\n<p>\"Nous aimerions mettre votre outil de test \u00e0 la disposition de nos clients potentiels\".<\/p>\n<p>\"Super ! Merci beaucoup pour cet outil. Bon week-end et joyeux No\u00ebl;-))\"<\/p>\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">Je suis d'accord avec la politique de confidentialit\u00e9<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Demander une d\u00e9mo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Vuln\u00e9rabilit\u00e9 dans Log4j \u2013 des attaques sont d\u00e9j\u00e0 en cours. Ne perdez pas de temps \u00e0 v\u00e9rifier la s\u00e9curit\u00e9 de vos syst\u00e8mes.<\/p>","protected":false},"author":8,"featured_media":2627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[15,16],"class_list":["post-2626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-log4j","tag-sicherheitsluecke"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind - LocateRisk<\/title>\n<meta name=\"description\" content=\"Schwachstelle in Log4j \u2013 Was tun? Verlieren Sie keine Zeit! \u00dcberpr\u00fcfen Sie die Sicherheit Ihrer Systeme mit dem Log4j-Scanner und in diesen 5 Schritten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Schwachstelle in Log4j \u2013 Was tun? Verlieren Sie keine Zeit! \u00dcberpr\u00fcfen Sie die Sicherheit Ihrer Systeme mit dem Log4j-Scanner und in diesen 5 Schritten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-13T11:51:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:26:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"602\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind\",\"datePublished\":\"2021-12-13T11:51:21+00:00\",\"dateModified\":\"2025-08-08T07:26:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\"},\"wordCount\":925,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\",\"keywords\":[\"log4j\",\"Sicherheitsl\u00fccke\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\",\"name\":\"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\",\"datePublished\":\"2021-12-13T11:51:21+00:00\",\"dateModified\":\"2025-08-08T07:26:03+00:00\",\"description\":\"Schwachstelle in Log4j \u2013 Was tun? Verlieren Sie keine Zeit! \u00dcberpr\u00fcfen Sie die Sicherheit Ihrer Systeme mit dem Log4j-Scanner und in diesen 5 Schritten.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg\",\"width\":1080,\"height\":602,\"caption\":\"Sicherheitsl\u00fccke setzt das Netz in Flammen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9 dans Log4j - D\u00e9couvrez lesquels de vos serveurs sont concern\u00e9s - LocateRisk","description":"Vuln\u00e9rabilit\u00e9 dans Log4j - Que faire ? Ne perdez pas de temps ! V\u00e9rifiez la s\u00e9curit\u00e9 de vos syst\u00e8mes avec le scanneur Log4j et en suivant ces 5 \u00e9tapes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","og_locale":"fr_FR","og_type":"article","og_title":"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind - LocateRisk","og_description":"Schwachstelle in Log4j \u2013 Was tun? Verlieren Sie keine Zeit! \u00dcberpr\u00fcfen Sie die Sicherheit Ihrer Systeme mit dem Log4j-Scanner und in diesen 5 Schritten.","og_url":"https:\/\/locaterisk.com\/fr\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","og_site_name":"LocateRisk","article_published_time":"2021-12-13T11:51:21+00:00","article_modified_time":"2025-08-08T07:26:03+00:00","og_image":[{"width":1080,"height":602,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","type":"image\/jpeg"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Kristina Breuer","Dur\u00e9e de lecture estim\u00e9e":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind","datePublished":"2021-12-13T11:51:21+00:00","dateModified":"2025-08-08T07:26:03+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/"},"wordCount":925,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","keywords":["log4j","Sicherheitsl\u00fccke"],"articleSection":["Blog post"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","url":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/","name":"Vuln\u00e9rabilit\u00e9 dans Log4j - D\u00e9couvrez lesquels de vos serveurs sont concern\u00e9s - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","datePublished":"2021-12-13T11:51:21+00:00","dateModified":"2025-08-08T07:26:03+00:00","description":"Vuln\u00e9rabilit\u00e9 dans Log4j - Que faire ? Ne perdez pas de temps ! V\u00e9rifiez la s\u00e9curit\u00e9 de vos syst\u00e8mes avec le scanneur Log4j et en suivant ces 5 \u00e9tapes.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/thx-to-arnau-soler-Qol8R25RqdM-unsplash.jpg","width":1080,"height":602,"caption":"Sicherheitsl\u00fccke setzt das Netz in Flammen"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/sicherheitsluecke-log4j-finden-sie-heraus-welche-ihrer-server-betroffen-sind\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Sicherheitsl\u00fccke in Log4j \u2013 Finden Sie heraus, welche Ihrer Server betroffen sind"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/2626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=2626"}],"version-history":[{"count":44,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/2626\/revisions"}],"predecessor-version":[{"id":6303,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/2626\/revisions\/6303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/2627"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=2626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/categories?post=2626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/tags?post=2626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}