{"id":18544,"date":"2022-06-05T10:25:37","date_gmt":"2022-06-05T17:25:37","guid":{"rendered":"https:\/\/sn1persecurity.com\/wordpress\/?p=18544"},"modified":"2023-05-06T06:41:53","modified_gmt":"2023-05-06T13:41:53","slug":"confluence-rce-ognl-template-injection-cve-2022-26134","status":"publish","type":"post","link":"https:\/\/sn1persecurity.com\/wordpress\/confluence-rce-ognl-template-injection-cve-2022-26134\/","title":{"rendered":"Confluence RCE via OGNL template injection (CVE-2022-26134)"},"content":{"rendered":"<p>A critical vulnerability affecting the Atlassian Confluence was disclosed and designated <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-26134\" target=\"_blank\" rel=\"noopener\">CVE-2022-26134<\/a> which <strong>allows an un-authenticated attacker to execute arbitrary code on vulnerable servers<\/strong>. <a href=\"https:\/\/github.com\/search?q=CVE-2022-26134+exploit+OR+poc+OR+CVE\" target=\"_blank\" rel=\"noopener\">A number of Proof-of-Concept (PoC) exploits were published online<\/a> and exploit activity is actively being observed. Given the impact and severity of the vulnerability, Sn1perSecurity has released an out-of-band update to help detect vulnerable servers in your environment using <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per Professional<\/a> and <a href=\"https:\/\/sn1persecurity.com\/wordpress\/product\/sn1per-enterprise\/\">Sn1per Enterprise<\/a>.<\/p>\n<p><strong>Severity: <span style=\"color: #ff0000;\">CRITICAL<\/span> | Exploit Available: <span style=\"color: #99cc00;\">Yes<\/span> | Exploitability: <span style=\"color: #99cc00;\">Easy<\/span> | Remotely Exploitable: <span style=\"color: #99cc00;\">Yes<\/span><\/strong><\/p>\n<p><!--more--><\/p>\n<h4>Detect CVE-2022-26134 with Sn1per<\/h4>\n<p>To detect the <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-26134\" target=\"_blank\" rel=\"noopener\">CVE-2022-26134<\/a> vulnerability using <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per<\/a>, do the following:<\/p>\n<ol>\n<li>Apply the template update from the Sn1per &#8220;<strong>Updates<\/strong>&#8221; panel.<\/li>\n<li>Ensure that the &#8220;<strong>SC0PE_VULNERABLITY_SCANNER<\/strong>&#8221; is set to &#8220;<strong>1<\/strong>&#8221; in your Sn1per configuration or choose the default scan profile (ie. \/sniper\/conf\/default) when running the scan.<\/li>\n<li>For multi-host scans, select &#8220;Live Web Hosts&#8221; from the &#8220;Multi-Host Scan&#8221; drop down menu.<\/li>\n<li>Select the config file set in the step #2.<\/li>\n<li>Set the number of &#8220;Tasks&#8221; to run simultaneously. For most environments (3-5 tasks should be sufficient without taxing the network too much).<\/li>\n<li>Hit the &#8220;Scan&#8221; button to start the scan.<\/li>\n<li>Use the Sn1per Vulnerability Report Viewer to view all active scan results.<\/li>\n<\/ol>\n<p>After the scan finishes, you can then view all vulnerable instances from the <a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\/\">Sn1per<\/a> &#8220;<strong>Vulnerability Report Viewer<\/strong>&#8220;.<\/p>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/06\/Sn1per-Enterprise-vulnerability-report1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18550 size-large\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/06\/Sn1per-Enterprise-vulnerability-report1-1024x579.png\" alt=\"Sn1per-Enterprise-vulnerability-report1\" width=\"1024\" height=\"579\" \/><\/a><\/p>\n<h4>Remediation<\/h4>\n<p>Atlassian recommends that you upgrade to the latest Long Term Support release. For a full description of the latest version, see the <a class=\"conf-macro output-inline\" href=\"https:\/\/confluence.atlassian.com\/doc\/confluence-release-notes-327.html\" data-macro-name=\"sp-plaintextbody-link\" data-hasbody=\"true\">Confluence Server and Data Center Release Notes<\/a>. You can download the latest version\u00a0from the <a class=\"external-link\" href=\"https:\/\/www.atlassian.com\/software\/confluence\/download-archives\" rel=\"nofollow\">download centre<\/a>.<\/p>\n<p>Note: If you run Confluence in a cluster, you will not be able to upgrade to the fixed versions without downtime, also known as a rolling upgrade. Follow the steps in <a href=\"https:\/\/confluence.atlassian.com\/doc\/upgrading-confluence-data-center-1507377.html\" rel=\"nofollow\">Upgrading Confluence Data Center<\/a>.<\/p>\n<p>NOTE: This update is only available for Sn1per Professional v10.0 and Sn1per Enterprise customers.<\/p>\n<div id=\"wp-share-button-18544\" class=\"wp-share-button theme28\"><span class=\"total-share \"><i class=\"total-count-text\">Total Share<\/i> <i class=\"total-count\">7<\/i> <\/span><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/sn1persecurity.com\/wordpress\/confluence-rce-ognl-template-injection-cve-2022-26134\/\" class=\"share-button share-button-18544 facebook\" id=\"facebook\" data-nonce=\"b395a66aef\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Facebook<\/span>\r\n\r\n<span class=\"button-count\">6<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/sn1persecurity.com\/wordpress\/confluence-rce-ognl-template-injection-cve-2022-26134\/&#038;text=Confluence%20RCE%20via%20OGNL%20template%20injection%20(CVE-2022-26134)\" class=\"share-button share-button-18544 twitter\" id=\"twitter\" data-nonce=\"b395a66aef\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Twitter<\/span>\r\n\r\n<span class=\"button-count\">0<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"http:\/\/www.reddit.com\/submit?title=Confluence%20RCE%20via%20OGNL%20template%20injection%20(CVE-2022-26134)&#038;url=https:\/\/sn1persecurity.com\/wordpress\/confluence-rce-ognl-template-injection-cve-2022-26134\/\" class=\"share-button share-button-18544 reddit\" id=\"reddit\" data-nonce=\"b395a66aef\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Reddit<\/span>\r\n\r\n<span class=\"button-count\">0<\/span>\r\n\r\n<\/a>\r\n\r\n<a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/sn1persecurity.com\/wordpress\/confluence-rce-ognl-template-injection-cve-2022-26134\/&#038;title=Confluence%20RCE%20via%20OGNL%20template%20injection%20(CVE-2022-26134)&#038;summary=&#038;source=\" class=\"share-button share-button-18544 linkedin\" id=\"linkedin\" data-nonce=\"b395a66aef\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Linkedin<\/span>\r\n\r\n<span class=\"button-count\">1<\/span>\r\n\r\n<\/a>\r\n\r\n<a title=\"More...\" href=\"#wp-share-button-18544\" class=\"share-button-more\"><span class=\"button-icon\"><i class=\"fa fa-plus\"><\/i><\/span><\/a><div class=\"wp-share-button-popup wp-share-button-popup-18544\"><div class=\"popup-buttons\"><span class=\"close\">X<\/span><a target=\"_blank\" href=\"mailto:?subject=Confluence%20RCE%20via%20OGNL%20template%20injection%20(CVE-2022-26134)&#038;body=https:\/\/sn1persecurity.com\/wordpress\/confluence-rce-ognl-template-injection-cve-2022-26134\/\" class=\"share-button share-button-18544 email\" id=\"email\">\r\n\r\n<span class=\"button-icon\"><\/span>\r\n<span class=\"button-name\">Email<\/span>\r\n<span class=\"button-count\">0<\/span>\t\t\t\t\r\n\r\n<\/a>\r\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability affecting the Atlassian Confluence was disclosed and designated CVE-2022-26134 which allows an un-authenticated attacker to execute arbitrary code on vulnerable [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18546,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[290,80,99,184,289,338],"tags":[324,323,318,52,38,42,37,108],"class_list":["post-18544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-attack-surface-management","category-bug-bounties","category-cves","category-news","category-penetration-testing","category-threat-intelligence","tag-confluence","tag-cve-2022-26134","tag-detection","tag-exploit","tag-professional","tag-scanner","tag-sn1per","tag-vulnerability"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/06\/Sn1per-CVE-2022-26134-detection1.png","jetpack_shortlink":"https:\/\/wp.me\/pdnW96-4P6","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":18193,"url":"https:\/\/sn1persecurity.com\/wordpress\/big-ip-icontrol-rest-rce-cve-2022-1388-detection-with-sn1per-professional\/","url_meta":{"origin":18544,"position":0},"title":"BIG-IP iControl REST RCE (CVE-2022-1388) Detection with Sn1per Professional","author":"xer0dayz","date":"May 10, 2022","format":false,"excerpt":"A critical vulnerability affecting the F5 BIG-IP devices was disclosed and designated CVE-2022-1388 which allows an un-authenticated attacker to execute arbitrary code on vulnerable servers. A number of Proof-of-Concept (PoC) exploits were published online and exploit activity is actively being observed. Given the impact and severity of the vulnerability, Sn1perSecurity\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Sn1per-CVE-2022-1388-Scanner1","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-CVE-2022-1388-Scanner1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-CVE-2022-1388-Scanner1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-CVE-2022-1388-Scanner1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-CVE-2022-1388-Scanner1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-CVE-2022-1388-Scanner1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-CVE-2022-1388-Scanner1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17988,"url":"https:\/\/sn1persecurity.com\/wordpress\/vmware-workspace-one-access-freemarker-ssti-cve-2022-22954-detection-with-sn1per-professional\/","url_meta":{"origin":18544,"position":1},"title":"VMware Workspace ONE Access freemarker SSTI (CVE-2022-22954) Detection with Sn1per Professional","author":"xer0dayz","date":"April 14, 2022","format":false,"excerpt":"Information regarding a critical 0-day vulnerability affecting the VMware Workspace ONE Access and Identity Manager was disclosed and designated CVE-2022-22954 which allows an un-authenticated attacker to execute arbitrary code on vulnerable servers. On April 14th, CISA & US-Cert added CVE-2022-22954 to their catalog of known exploited vulnerabilities after a number\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-cve-2022-22954-detection1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17958,"url":"https:\/\/sn1persecurity.com\/wordpress\/spring4shell-cve-2022-22965-detection-with-sn1per-professional\/","url_meta":{"origin":18544,"position":2},"title":"Spring4Shell (CVE-2022-22965) Detection with Sn1per Professional","author":"xer0dayz","date":"April 11, 2022","format":false,"excerpt":"On March 30, 2022, information regarding a critical 0-day vulnerability affecting the Spring Framework was disclosed and dubbed \"Spring4Shell\" CVE-2022-22965 which allows an un-authenticated attacker to execute arbitrary code on vulnerable servers. Given the impact and severity of the vulnerability, Sn1perSecurity has released an out-of-band update to help detect vulnerable\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Sn1per-Spring4Shell-Scanner1","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/04\/Sn1per-Spring4Shell-Scanner1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":26771,"url":"https:\/\/sn1persecurity.com\/wordpress\/cve-2024-21733-apache-tomcat-http-request-smuggling\/","url_meta":{"origin":18544,"position":3},"title":"CVE-2024-21733 Apache Tomcat HTTP Request Smuggling","author":"xer0dayz","date":"January 21, 2024","format":false,"excerpt":"Our security research team recently discovered a critical \"0day\" vulnerability which was assigned CVE-2024-21733. The vulnerability was discovered by xer0dayz from Sn1perSecurity LLC and allows attackers to force a victim's browser to de-synchronize its connection with websites hosted on top of Apache Tomcat, causing sensitive data to be smuggled from\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"CVE-2024-21733 Apache Tomcat HTTP Request Smuggling","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2024\/01\/CVE-2024-21733.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2024\/01\/CVE-2024-21733.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2024\/01\/CVE-2024-21733.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2024\/01\/CVE-2024-21733.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2024\/01\/CVE-2024-21733.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2024\/01\/CVE-2024-21733.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":19102,"url":"https:\/\/sn1persecurity.com\/wordpress\/sn1per-scan-engine-v10-2-update\/","url_meta":{"origin":18544,"position":4},"title":"Sn1per Scan Engine v10.2 Released!","author":"xer0dayz","date":"July 20, 2022","format":false,"excerpt":"Sn1per SE (Scan Engine) v10.2 is now available with a ton of new features and improvements. This update is part of the Sn1per SE development branch which is available to Sn1per Professional v10.0 and Sn1per Enterprise customers. If you are a previous customer (ie. Sn1per Professional v9.0 or less) or\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/news\/"},"img":{"alt_text":"Sn1per SE v10.2 Update","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/07\/Sn1per-SE-v10.2-Update.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/07\/Sn1per-SE-v10.2-Update.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/07\/Sn1per-SE-v10.2-Update.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/07\/Sn1per-SE-v10.2-Update.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/07\/Sn1per-SE-v10.2-Update.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/07\/Sn1per-SE-v10.2-Update.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":14967,"url":"https:\/\/sn1persecurity.com\/wordpress\/continuous-attack-surface-management-with-sn1per-professional\/","url_meta":{"origin":18544,"position":5},"title":"Attack Surface Management With Sn1per Professional","author":"xer0dayz","date":"February 8, 2021","format":false,"excerpt":"External Attack Surface Management (EASM) has become a crucial function for every organization to gain visibility of their perimeter security. Having the right tools and processes in place is vital to detecting new vulnerabilities before attackers do. In this blog post, we will outline the basic steps for discovering the\u2026","rel":"","context":"In &quot;Attack Surface Management&quot;","block_context":{"text":"Attack Surface Management","link":"https:\/\/sn1persecurity.com\/wordpress\/category\/attack-surface-management\/"},"img":{"alt_text":"Sn1per Professional Continuous Attack Surface Testing","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/Sn1per-Professional-Continuous-Attack-Surface-Testing.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/18544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/comments?post=18544"}],"version-history":[{"count":6,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/18544\/revisions"}],"predecessor-version":[{"id":18553,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/posts\/18544\/revisions\/18553"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media\/18546"}],"wp:attachment":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media?parent=18544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/categories?post=18544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/tags?post=18544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}