{"id":8640,"date":"2021-05-18T08:00:31","date_gmt":"2021-05-18T06:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=8640"},"modified":"2024-12-11T10:20:08","modified_gmt":"2024-12-11T09:20:08","slug":"sap-security-patch-day-mayo-2021","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-mayo-2021\/","title":{"rendered":"SAP Security Patch Day<br><span class=\"font-300\">Mayo 2021<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2021\/05\/sap-security-patch-day-mayo-2021.png&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;sap-security-patch-day-mayo-2021&#8243; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; content__hover_enabled=&#8221;off|hover&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Este<strong>\u00a0\u201c<a href=\"https:\/\/wiki.scn.sap.com\/wiki\/pages\/viewpage.action?pageId=552599675\" target=\"_blank\" rel=\"noopener\">SAP Security Patch Day<\/a>\u201d\u00a0<\/strong>de mayo ha sido bastante m\u00e1s tranquilo con menos notas liberadas de lo que nos tienen acostumbrados. Eso s\u00ed, en este mes, podemos ver las primeras notas liberadas que afectan a sistemas SAP Business One con base de datos HANA que comentaremos durante el art\u00edculo.<\/p>\n<p>En cuanto a n\u00fameros, se han liberado un total de 11 notas de seguridad de las cuales 6 son de prioridad alta con una puntuaci\u00f3n CVSS por encima de 7. De las 11 notas, 5 son actualizaciones de vulnerabilidades descubiertas en meses anteriores, por lo que habr\u00e1 que revisar las notas de nuevo para ejecutar las instrucciones en caso de que aplique a nuestros sistemas. De las 6 notas de prioridad alta 3 son encontradas en el \u00faltimo mes y por tanto las m\u00e1s importantes para chequear si afectan o no a nuestros sistemas.<\/p>\n<p>A continuaci\u00f3n, analizaremos estas 6 notas:<\/p>\n<p><span class=\"has-inline-color\"><strong>[<\/strong>CVE-2021-27611<strong>]\u00a0Code Injection vulnerability in SAP NetWeaver\u00a0AS\u00a0ABAP<\/strong><\/span><\/p>\n<p>Con un 8.2 de puntuaci\u00f3n CVSS, la brecha [CVE-2021-27611] afecta a los sistemas NetWeaver en sus versiones 700,701,702,730,731 y permite a un atacante con autorizaciones para ejecutar programas, inyectar c\u00f3digo malicioso en el sistema pudiendo modificar datos, sobrescribir y llegar a generar una denegaci\u00f3n de servicios (DoS).<\/p>\n<p>El error est\u00e1 en la ejecuci\u00f3n del programa RDDPUTJR, el cual es eliminado implementando la nota\u00a0<a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3046610\" target=\"_blank\" rel=\"noopener\"><strong>3046610<\/strong><\/a>\u00a0o actualizando el componente SAP BASIS al SP m\u00e1s actual dentro de la versi\u00f3n en la que este el componente.<\/p>\n<p>Si no se quieren realizar estas modificaciones por alguna raz\u00f3n, ser\u00eda conveniente, por lo menos, inhabilitar la ejecuci\u00f3n de ese report desde las transacciones SA38 o SE38 mediante autorizaciones y roles.<\/p>\n<p>Las siguientes dos vulnerabilidades vienen separadas, aunque aplican al mismo sistema SAP Business One sobre base de datos HANA y contienen\u00a0la misma puntuaci\u00f3n\u00a0CVSS de 7.8.<\/p>\n<p><strong>[<\/strong>CVE-2021-27616<strong>]<span class=\"has-inline-color\">\u00a0Multiple vulnerabilities in SAP Business One, version for SAP HANA (Business-One-Hana-Chef-Cookbook)<\/span><\/strong><\/p>\n<p><strong>[<\/strong>CVE-2021-27613<strong>]<span class=\"has-inline-color\">\u00a0Information Disclosure in SAP Business One (Chef business-one-cookbook)<\/span><\/strong><\/p>\n<p>Estas vulnerabilidades, est\u00e1n compuestas por dos tipos de vulnerabilidades como son la divulgaci\u00f3n de informaci\u00f3n e inyecci\u00f3n de c\u00f3digo malicioso. Aplican a cierto componente utilizado para instalar SBO, que, en ciertas condiciones, permite a un atacante acceder a carpetas temporales con datos de n\u00f3mina o datos de backups que deber\u00edan de estar restringida.<\/p>\n<p>La soluci\u00f3n pasa por seguir los pasos descritos en la nota<strong>\u00a0<a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3049755\" target=\"_blank\" rel=\"noopener\">3049755<\/a><\/strong>\u00a0y la\u00a0<a href=\"https:\/\/launchpad.support.sap.com\/#\/notes\/3049661\" target=\"_blank\" rel=\"noopener\"><strong>3049661<\/strong><\/a>.<\/p>\n<p>Adem\u00e1s de las 3 vulnerabilidades comentadas, hay otras tres de prioridad alta que explicamos en art\u00edculos anteriores y se han liberado actualizaciones de la nota que deber\u00edan de ser examinadas en caso de que apliquen a los sistemas de nuestra empresa.<\/p>\n<p><strong><span class=\"has-inline-color\">Security updates for the browser control Google Chromium delivered with SAP Business Client \u2013 Articulo\u00a0<\/span><\/strong><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-enero-2021\/\"><span class=\"has-inline-color\">Enero<\/span><\/a><strong><span class=\"has-inline-color\">\u00a02021<\/span><\/strong><\/p>\n<p><strong><span class=\"has-inline-color\">Remote Code Execution vulnerability in Source Rules of SAP Commerce \u2013 Articulo\u00a0<\/span><\/strong><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-abril-2021\/\"><span class=\"has-inline-color\">Abril<\/span><\/a><strong><span class=\"has-inline-color\">\u00a02021<\/span><\/strong><\/p>\n<p><strong><span class=\"has-inline-color\">Code Injection in SAP Business Warehouse and SAP\u00a0BW\/4HANA \u2013 Articulo\u00a0<\/span><\/strong><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-enero-2021\/\"><span class=\"has-inline-color\">Enero<\/span><\/a><strong><span class=\"has-inline-color\">\u00a02021<\/span><\/strong><\/p>\n<p>En el siguiente cuadro todas las notas liberadas este mes para chequear si aplica o no en vuestros sistemas:<\/p>\n<div class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8647 size-full\" src=\"https:\/\/orekait.com\/wp-content\/uploads\/2021\/05\/image001-2.png\" alt=\"\" width=\"1325\" height=\"669\" srcset=\"https:\/\/orekait.com\/wp-content\/uploads\/2021\/05\/image001-2.png 1325w, https:\/\/orekait.com\/wp-content\/uploads\/2021\/05\/image001-2-1280x646.png 1280w, https:\/\/orekait.com\/wp-content\/uploads\/2021\/05\/image001-2-980x495.png 980w, https:\/\/orekait.com\/wp-content\/uploads\/2021\/05\/image001-2-480x242.png 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1325px, 100vw\" \/><\/div>\n<p>En lo que llevamos de a\u00f1o el equipo de seguridad de SAP lleva liberadas 73 notas de seguridad de las cuales 18 tienes una puntuaci\u00f3n CVSS por encima de 9 y 30 por encima de 7.<\/p>\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td>LOW<\/td>\n<td>MEDIUM<\/td>\n<td>HIGH<\/td>\n<td>HOT NEWS<\/td>\n<td>TOTAL<\/td>\n<\/tr>\n<tr>\n<td>Enero<\/td>\n<td>1<\/td>\n<td>10<\/td>\n<td>1<\/td>\n<td>5<\/td>\n<td><strong>17<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Febrero<\/td>\n<td>\u00a0<\/td>\n<td>8<\/td>\n<td>2<\/td>\n<td>3<\/td>\n<td><strong>13<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Marzo<\/td>\n<td>\u00a0<\/td>\n<td>8<\/td>\n<td>1<\/td>\n<td>4<\/td>\n<td><strong>13<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Abril<\/td>\n<td>\u00a0<\/td>\n<td>11<\/td>\n<td>5<\/td>\n<td>3<\/td>\n<td><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Mayo<\/td>\n<td>1<\/td>\n<td>4<\/td>\n<td>3<\/td>\n<td>3<\/td>\n<td><strong>11<\/strong><\/td>\n<\/tr>\n<tr>\n<td>TOTAL<\/td>\n<td><strong>2<\/strong><\/td>\n<td><strong>41<\/strong><\/td>\n<td><strong>12<\/strong><\/td>\n<td><strong>18<\/strong><\/td>\n<td><strong>73<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente.<\/p>\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td>Enero<\/td>\n<td>Febrero<\/td>\n<td>Marzo<\/td>\n<td>Abril<\/td>\n<td>Mayo<\/td>\n<td>TOTAL<\/td>\n<\/tr>\n<tr>\n<td>Clickjacking<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Code Injection<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>3<\/td>\n<td><strong>6<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Cross-Site Scripting<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Denial of Service<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Improper input validation<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>10<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>10<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Information Disclosure<\/td>\n<td>3<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>5<\/td>\n<td>3<\/td>\n<td><strong>11<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing Authorization Check<\/td>\n<td>4<\/td>\n<td>3<\/td>\n<td>6<\/td>\n<td>5<\/td>\n<td>1<\/td>\n<td><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing input Validation<\/td>\n<td>16<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>16<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Missing XML Validation<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Remote Code Execution<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Server Side Request Forgery<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td>SQL Injection<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Otros<\/td>\n<td>6<\/td>\n<td>6<\/td>\n<td>4<\/td>\n<td>5<\/td>\n<td>4<\/td>\n<td><strong>25<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td><strong>33<\/strong><\/td>\n<td><strong>14<\/strong><\/td>\n<td><strong>22<\/strong><\/td>\n<td><strong>19<\/strong><\/td>\n<td><strong>13<\/strong><\/td>\n<td><strong>101<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.<\/p>\n<p>Como siempre, solo queda recomendar pasarse por el apartado de\u00a0<a href=\"https:\/\/launchpad.support.sap.com\/#\/securitynotes\" target=\"_blank\" rel=\"noopener\"><strong>security notes<\/strong><\/a>\u00a0<strong>del Launchpad de SAP<\/strong>\u00a0y analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de nuestros sistemas e instalar la que apliquen a los sistemas de cada empresa.<\/p>\n<p>Fuente:<\/p>\n<p><a href=\"https:\/\/wiki.scn.sap.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/wiki.scn.sap.com\/<\/a><\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221; url_new_window=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Este\u00a0\u201cSAP Security Patch Day\u201d\u00a0de mayo ha sido bastante m\u00e1s tranquilo con menos notas liberadas de lo que nos tienen acostumbrados. Eso s\u00ed, en este mes, podemos ver las primeras notas liberadas que afectan a sistemas SAP Business One con base de datos HANA que comentaremos durante el art\u00edculo. En cuanto a n\u00fameros, se han liberado [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8642,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[48,50],"tags":[],"class_list":["post-8640","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-administracion-de-sistemas","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/8640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=8640"}],"version-history":[{"count":5,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/8640\/revisions"}],"predecessor-version":[{"id":21548,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/8640\/revisions\/21548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/8642"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=8640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=8640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=8640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}