{"id":6980,"date":"2019-11-19T12:10:46","date_gmt":"2019-11-19T12:10:46","guid":{"rendered":"https:\/\/nextcloud.com\/?p=6980"},"modified":"2019-11-19T12:10:46","modified_gmt":"2019-11-19T12:10:46","slug":"nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout","status":"publish","type":"post","link":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/","title":{"rendered":"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout"},"content":{"rendered":"<p>As you might have read in various news outlets, an attacker has been trying to use a known and <a href=\"https:\/\/nextcloud.com\/blog\/urgent-security-issue-in-nginx-php-fpm\/\" rel=\"noopener noreferrer nofollow\">reported NGINX\/PHP-FPM bug<\/a> (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11043\" rel=\"noopener noreferrer nofollow\">CVE-2019-11043<\/a>) to break into servers. After breaking into the server and gaining control, the attacker used a compiled python script that encrypts data in the Nextcloud data folder and unsuccessfully tried to get ransom paid for decrypting it. The servers that were broken in were two private servers. As most Nextcloud users don&rsquo;t use NGINX and those who did have largely updated following our warnings 3 weeks ago, only these 2 servers out of 300.000 are known to be compromised and no ransom payments to the bitcoin address have been made.<\/p>\n<p>As the attacker gained full control over the server through a bug outside the control of Nextcloud, we could not do anything other than warn our users to update and secure their servers. For this we reached out through social media, mailing lists and <a href=\"https:\/\/nextcloud.com\/blog\/urgent-security-issue-in-nginx-php-fpm\/\" rel=\"noopener noreferrer nofollow\">our blog<\/a> and also used our administrator notification feature to reach out to all server administrators (who did not disable this feature).<\/p>\n<p>We repeat our official statement to the press below.<\/p>\n<blockquote><p><em>We are confident that the attack vector was the nginx+php-fpm security issue that hit the web some time ago.<br \/>\n<br \/>\nWhile it was not an issue in Nextcloud itself, we informed our users through all channels we had available, including a direct notification to all administrators of Nextcloud servers. This likely explains why so few servers were impacted out of the hundreds of thousands of Nextcloud servers on the web.<br \/>\n<br \/>\nWe consider it a lesson that shows the value of taking security serious. We urge other PHP based projects to also issue warnings to their users about this issue, as this vulnerability persists for some.<br \/>\n<br \/>\nSome background on the issue:<br \/>\n<br \/>\nPHP bug report: <a href=\"https:\/\/bugs.php.net\/bug.php?id=78599\" rel=\"noopener noreferrer nofollow\">https:\/\/bugs.php.net\/bug.php?id=78599<\/a><br \/>\n<br \/>\nOur blog: <a href=\"https:\/\/nextcloud.com\/blog\/urgent-security-issue-in-nginx-php-fpm\/\" rel=\"noopener noreferrer nofollow\">https:\/\/nextcloud.com\/blog\/urgent-security-issue-in-nginx-php-fpm\/<\/a><br \/>\n<br \/>\nCVE: <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11043\" rel=\"noopener noreferrer nofollow\">nvd.nist.gov\/vuln\/detail\/CVE-2019-11043<\/a><br \/>\n<br \/>\nSo the \u00ab\u00a0task\u00a0\u00bb of the hacker was:<\/p>\n<ol>\n<li>read our blog<\/li>\n<li>find Nextcloud servers<\/li>\n<li>Try to execute the exploit of php_fpm+nginx<\/li>\n<\/ol>\n<p>The attacker bothered to write a python script to explicitly target Nextcloud servers. We hope the lack of results will help act as a deterrence from doing this in the future.<br \/>\n<br \/>\nGiven we have a <a href=\"https:\/\/nextcloud.com\/blog\/nextcloud-conference-news-nextcloud-gmbh-doubling-hackerone-security-bug-bounties\/\" rel=\"noopener\" target=\"_blank\">USD 10K security bug bounty program,<\/a> we&rsquo;d expect most hackers that find an issue in Nextcloud serious enough to do this to report it to us.<\/em><\/p><\/blockquote>\n<p>Until now, nobody has found such a serious vulnerability, but if you think you know one, please <a href=\"https:\/\/hackerone.com\/nextcloud\" rel=\"noopener noreferrer nofollow\">report it<\/a> and collect your bounty! We are the only on-premises file sync and collaboration solution with such a big bounty, showing how serious we take security.<\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-nextcry-ransomware-encrypts-data-on-nextcloud-linux-servers\/\" rel=\"noopener noreferrer nofollow\">Bleepingcomputer<\/a> which first reported this issue noted about the bitcoin wallet the attacker used:<\/p>\n<blockquote><p>no transactions have been recorded until now<\/p><\/blockquote>\n<p>While we are of course sorry for the two users who&rsquo;s servers were hit, we are also glad that this incident shows that our prompt and (by some called over-the-top) response to the security issue in NGINX and PHP-FPM was effective in helping protect our users from the risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you might have read in various news outlets, an attacker has been trying to use a known and reported NGINX\/PHP-FPM bug (CVE-2019-11043) to break into servers. After breaking into the server and gaining control, the attacker used a compiled python script that encrypts data in the Nextcloud data folder and unsuccessfully tried to get [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1423,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"publish_to_discourse":"0","publish_post_category":"22","wpdc_auto_publish_overridden":"1","wpdc_topic_tags":"","wpdc_pin_topic":"","wpdc_pin_until":"","discourse_post_id":"180894","discourse_permalink":"https:\/\/help.nextcloud.com\/t\/nextcry-or-how-a-hacker-tried-to-exploit-a-php-fpm-nginx-bug-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/64490","wpdc_publishing_response":"","wpdc_publishing_error":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-6980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout - Nextcloud<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout - Nextcloud\" \/>\n<meta property=\"og:description\" content=\"As you might have read in various news outlets, an attacker has been trying to use a known and reported NGINX\/PHP-FPM bug (CVE-2019-11043) to break into servers. After breaking into the server and gaining control, the attacker used a compiled python script that encrypts data in the Nextcloud data folder and unsuccessfully tried to get [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/\" \/>\n<meta property=\"og:site_name\" content=\"Nextcloud\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Nextclouders\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-19T12:10:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nextcloud.com\/wp-content\/uploads\/2022\/03\/jos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jos Poortvliet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nextclouders\" \/>\n<meta name=\"twitter:site\" content=\"@nextclouders\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jos Poortvliet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/\"},\"author\":{\"name\":\"Jos Poortvliet\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/c3c1a52fbc1c6a2be2f1df8818daa8c2\"},\"headline\":\"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout\",\"datePublished\":\"2019-11-19T12:10:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/\"},\"wordCount\":542,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/03\/jos.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/\",\"url\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/\",\"name\":\"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout - Nextcloud\",\"isPartOf\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/03\/jos.jpg\",\"datePublished\":\"2019-11-19T12:10:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#primaryimage\",\"url\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/03\/jos.jpg\",\"contentUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/03\/jos.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"Jos Poortvliet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nextcloud.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#website\",\"url\":\"https:\/\/nextcloud.com\/fr\/\",\"name\":\"Nextcloud\",\"description\":\"Regain control over your data\",\"publisher\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nextcloud.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#organization\",\"name\":\"Nextcloud\",\"url\":\"https:\/\/nextcloud.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg\",\"contentUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"Nextcloud\"},\"image\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Nextclouders\/\",\"https:\/\/x.com\/nextclouders\",\"https:\/\/www.linkedin.com\/company\/10827569\/\",\"https:\/\/youtube.com\/nextcloud\",\"https:\/\/www.instagram.com\/nextclouders\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/c3c1a52fbc1c6a2be2f1df8818daa8c2\",\"name\":\"Jos Poortvliet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1c6de64891ee8c4902e1ac198f26ea5fb202d8bbaa7bce35b6a184610bbe4a3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1c6de64891ee8c4902e1ac198f26ea5fb202d8bbaa7bce35b6a184610bbe4a3d?s=96&d=mm&r=g\",\"caption\":\"Jos Poortvliet\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout - Nextcloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/","og_locale":"fr_FR","og_type":"article","og_title":"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout - Nextcloud","og_description":"As you might have read in various news outlets, an attacker has been trying to use a known and reported NGINX\/PHP-FPM bug (CVE-2019-11043) to break into servers. After breaking into the server and gaining control, the attacker used a compiled python script that encrypts data in the Nextcloud data folder and unsuccessfully tried to get [&hellip;]","og_url":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/","og_site_name":"Nextcloud","article_publisher":"https:\/\/www.facebook.com\/Nextclouders\/","article_published_time":"2019-11-19T12:10:46+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/nextcloud.com\/wp-content\/uploads\/2022\/03\/jos.jpg","type":"image\/jpeg"}],"author":"Jos Poortvliet","twitter_card":"summary_large_image","twitter_creator":"@nextclouders","twitter_site":"@nextclouders","twitter_misc":{"\u00c9crit par":"Jos Poortvliet","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#article","isPartOf":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/"},"author":{"name":"Jos Poortvliet","@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/c3c1a52fbc1c6a2be2f1df8818daa8c2"},"headline":"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout","datePublished":"2019-11-19T12:10:46+00:00","mainEntityOfPage":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/"},"wordCount":542,"commentCount":0,"publisher":{"@id":"https:\/\/nextcloud.com\/fr\/#organization"},"image":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#primaryimage"},"thumbnailUrl":"https:\/\/nextcloud.com\/c\/uploads\/2022\/03\/jos.jpg","articleSection":["Security"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/","url":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/","name":"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout - Nextcloud","isPartOf":{"@id":"https:\/\/nextcloud.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#primaryimage"},"image":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#primaryimage"},"thumbnailUrl":"https:\/\/nextcloud.com\/c\/uploads\/2022\/03\/jos.jpg","datePublished":"2019-11-19T12:10:46+00:00","breadcrumb":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#primaryimage","url":"https:\/\/nextcloud.com\/c\/uploads\/2022\/03\/jos.jpg","contentUrl":"https:\/\/nextcloud.com\/c\/uploads\/2022\/03\/jos.jpg","width":1000,"height":1000,"caption":"Jos Poortvliet"},{"@type":"BreadcrumbList","@id":"https:\/\/nextcloud.com\/fr\/blog\/nextcry-or-how-a-hacker-tried-to-exploit-a-nginx-issue-with-2-nextcloud-servers-out-of-300-000-hit-and-no-payout\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nextcloud.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Nextcry or how a hacker tried to exploit a NGINX issue with 2 Nextcloud servers out of 300.000 hit and no payout"}]},{"@type":"WebSite","@id":"https:\/\/nextcloud.com\/fr\/#website","url":"https:\/\/nextcloud.com\/fr\/","name":"Nextcloud","description":"Regain control over your data","publisher":{"@id":"https:\/\/nextcloud.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nextcloud.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/nextcloud.com\/fr\/#organization","name":"Nextcloud","url":"https:\/\/nextcloud.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg","contentUrl":"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg","width":"1024","height":"1024","caption":"Nextcloud"},"image":{"@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Nextclouders\/","https:\/\/x.com\/nextclouders","https:\/\/www.linkedin.com\/company\/10827569\/","https:\/\/youtube.com\/nextcloud","https:\/\/www.instagram.com\/nextclouders\/"]},{"@type":"Person","@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/c3c1a52fbc1c6a2be2f1df8818daa8c2","name":"Jos Poortvliet","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1c6de64891ee8c4902e1ac198f26ea5fb202d8bbaa7bce35b6a184610bbe4a3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c6de64891ee8c4902e1ac198f26ea5fb202d8bbaa7bce35b6a184610bbe4a3d?s=96&d=mm&r=g","caption":"Jos Poortvliet"}}]}},"featured_media_url":"https:\/\/nextcloud.com\/c\/uploads\/2022\/03\/jos.jpg","_links":{"self":[{"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/posts\/6980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/comments?post=6980"}],"version-history":[{"count":0,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/posts\/6980\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/media\/1423"}],"wp:attachment":[{"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/media?parent=6980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/categories?post=6980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/tags?post=6980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}