{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/unit42.paloaltonetworks.com\/fr\/","author_name":"Sheida Azimi","author_url":"https:\/\/unit42.paloaltonetworks.com\/fr\/author\/sheida-azimi\/","title":"La coercition d\u2019authentification n\u2019a pas dit son dernier mot\u00a0\u2013 cap sur cette menace en \u00e9volution","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"LZdNci0WMo\"><a href=\"https:\/\/unit42.paloaltonetworks.com\/fr\/authentication-coercion\/\">La coercition d\u2019authentification n\u2019a pas dit son dernier mot\u00a0\u2013 cap sur cette menace en \u00e9volution<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/unit42.paloaltonetworks.com\/fr\/authentication-coercion\/embed\/#?secret=LZdNci0WMo\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0La coercition d\u2019authentification n\u2019a pas dit son dernier mot\u00a0\u2013 cap sur cette menace en \u00e9volution\u00a0\u00bb &#8212; Unit 42\" data-secret=\"LZdNci0WMo\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/11\/07_Vulnerabilities_1920x900.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"La technique de \u00ab session smuggling \u00bb (ou d\u00e9tournement de session) agentique est une m\u00e9thode in\u00e9dite qui exploite \u00e0 mauvais escient la communication entre agents IA. Nous pr\u00e9sentons ici deux preuves de concept."}