{"id":675,"date":"2018-09-13T12:00:32","date_gmt":"2018-09-13T10:00:32","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=675"},"modified":"2020-07-24T12:52:04","modified_gmt":"2020-07-24T10:52:04","slug":"code-injection-by-logical-databases","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/","title":{"rendered":"Code injection by logical databases"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-674 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805-300x200.png\" alt=\"SAST Code Security Advisor\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805-300x200.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805-768x512.png 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Logical databases were once very popular. Complex selections were relatively easy to portray and effort-intensive reports were unnecessary. Users also appreciated the way dynamic selection worked, which encouraged developers to use the technique more and more. Starting from Version 7.50, SAP has now declared logical databases obsolete. Consequently, it advised against creating new logical databases, but allowed the old ones to continue as if nothing had happened. This, however, is a security risk that could impact any report.<\/p>\n<p><!--more--><\/p>\n<p>To execute a report in an SAP system, the programmer\u2019s code is enhanced by a number of internal instructions. For example, the &#8220;SPACE&#8221; constant is integrated via the <em>&lt;SYSINI&gt;<\/em> Include. In the context of logical databases, the subroutine two calls described in SAP help are likewise implemented (<em>before_event<\/em> and <em>after_event<\/em>). These subroutines are also built in \u2013 and executed in the case of a logical database.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-669\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/ABAP-Editor_SYSINI_1-300x147.png\" alt=\"ABAP-Editor_Include&lt;SYSINI&gt;\" width=\"300\" height=\"147\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/ABAP-Editor_SYSINI_1-300x147.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/ABAP-Editor_SYSINI_1.png 409w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Within the built-in <em>&lt;SYSINI&gt;<\/em> Include is a statement that an attacker can exploit.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-670 alignnone\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/ABAP-Editor_SYSINI_2-300x113.png\" alt=\"ABAP-Editor_Display-Include&lt;SYSINI&gt;\" width=\"300\" height=\"113\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/ABAP-Editor_SYSINI_2-300x113.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/ABAP-Editor_SYSINI_2.png 416w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>This statement is always filled with fixed (SAP Standard) reports in a normal report and is therefore noncritical. However, in the context of logical databases, the content of the <em>SY-LDBPG<\/em> variable is used to call standard routines. There is a distinction between how this field is filled by a &#8220;normal&#8221; generated report and by a report generated by a logical database.<\/p>\n<p>Now, if it is possible to fill the field <em>SY-LDBPG<\/em> in a report without a logical database, for example via a user exit, then the subroutines known are called within the same program. Under normal circumstances, the subroutines are not implemented and there is no risk involved. However, the <em>%_ROOT<\/em> subroutine is called with the program of the system field. This allows a section of source code to be specified that is outside the control of the program.<\/p>\n<p>Example: This report <u>without<\/u> a logical database fills the field directly.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-671\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/ABAP-Editor_Code-Injection_3-300x124.png\" alt=\"ABAP-Editor_Z_NORMAL_REPORT\" width=\"300\" height=\"124\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/ABAP-Editor_Code-Injection_3-300x124.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/ABAP-Editor_Code-Injection_3.png 416w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The only purpose of the report called was as a place to put the subroutine.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-672\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/ABAP-Editor_Code-Injection_4-300x90.png\" alt=\"ABAP-Editor_Z_HACK_ME\" width=\"300\" height=\"90\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/ABAP-Editor_Code-Injection_4-300x90.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/09\/ABAP-Editor_Code-Injection_4.png 428w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Result:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-673\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/ABAP-Editor_Code-Injection_5.png\" alt=\"ABAP-Editor_Report\" width=\"286\" height=\"105\" \/><\/p>\n<h3><strong>How to defend your ABAP code against attacks<\/strong><\/h3>\n<p>The akquinet AG <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/sap-platform-security\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST Code Security Advisor<\/a> allows you to recognize whether you have already fallen victim to this attack and to prevent it from happening again. You&#8217;ll only achieve a basic level of security that can weather stress tests and remain consistent if you take a truly head-to-toe approach to security. And that includes your ABAP code. The tool has a risk assessment enriched by key figures such as usage statistics to simplify prioritization for cleanup and an option to easily decommission obsolete code. This provides ideal protection from misuse of a potential backdoor.<\/p>\n<p>Do you want to hear more about platform security? Has our <a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/sap-platform-security\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST Code Security Advisor<\/a> piqued your interest? Come visit our <a href=\"https:\/\/sast-solutions.de\/index-2.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or contact us at <a href=\"mailto:knowhow@akquinet.de\">knowhow@akquinet.de<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-469\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/markusrest-e1522588795641.jpg\" alt=\"Markus Rest, SAST SOLUTIONS\" width=\"139\" height=\"157\" \/><\/p>\n<h6>Markus Rest<br \/>\nSAP ABAP Development<\/h6>\n","protected":false},"excerpt":{"rendered":"<p>Logical databases were once very popular. Complex selections were relatively easy to portray and effort-intensive reports were unnecessary. Users also appreciated the way dynamic selection worked, which encouraged developers to use the technique more and more. Starting from Version 7.50, SAP has now declared logical databases obsolete. Consequently, it advised against creating new logical databases, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[151,80],"class_list":["post-675","post","type-post","status-publish","format-standard","hentry","category-sast-suite","tag-grc","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Code injection by logical databases<\/title>\n<meta name=\"description\" content=\"Starting from Version 7.50, SAP has now declared logical databases obsolete. This, however, is a security risk that could impact any report.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Code injection by logical databases\" \/>\n<meta property=\"og:description\" content=\"Starting from Version 7.50, SAP has now declared logical databases obsolete. This, however, is a security risk that could impact any report.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-13T10:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T10:52:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805-300x200.png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Code injection by logical databases\",\"datePublished\":\"2018-09-13T10:00:32+00:00\",\"dateModified\":\"2020-07-24T10:52:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/\"},\"wordCount\":473,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Motiv_SAST-CSA_150dpi_1805-300x200.png\",\"keywords\":[\"GRC\",\"SAP Security\"],\"articleSection\":[\"SAST SUITE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/\",\"name\":\"Code injection by logical databases\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Motiv_SAST-CSA_150dpi_1805-300x200.png\",\"datePublished\":\"2018-09-13T10:00:32+00:00\",\"dateModified\":\"2020-07-24T10:52:04+00:00\",\"description\":\"Starting from Version 7.50, SAP has now declared logical databases obsolete. This, however, is a security risk that could impact any report.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Motiv_SAST-CSA_150dpi_1805-300x200.png\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Motiv_SAST-CSA_150dpi_1805-300x200.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/09\\\/13\\\/code-injection-by-logical-databases\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Code injection by logical databases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Code injection by logical databases","description":"Starting from Version 7.50, SAP has now declared logical databases obsolete. This, however, is a security risk that could impact any report.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/","og_locale":"en_US","og_type":"article","og_title":"Code injection by logical databases","og_description":"Starting from Version 7.50, SAP has now declared logical databases obsolete. This, however, is a security risk that could impact any report.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/","og_site_name":"SAST BLOG","article_published_time":"2018-09-13T10:00:32+00:00","article_modified_time":"2020-07-24T10:52:04+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805-300x200.png","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Code injection by logical databases","datePublished":"2018-09-13T10:00:32+00:00","dateModified":"2020-07-24T10:52:04+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/"},"wordCount":473,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805-300x200.png","keywords":["GRC","SAP Security"],"articleSection":["SAST SUITE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/","name":"Code injection by logical databases","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805-300x200.png","datePublished":"2018-09-13T10:00:32+00:00","dateModified":"2020-07-24T10:52:04+00:00","description":"Starting from Version 7.50, SAP has now declared logical databases obsolete. This, however, is a security risk that could impact any report.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805-300x200.png","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/09\/Motiv_SAST-CSA_150dpi_1805-300x200.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/09\/13\/code-injection-by-logical-databases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Code injection by logical databases"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=675"}],"version-history":[{"count":7,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/675\/revisions"}],"predecessor-version":[{"id":1338,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/675\/revisions\/1338"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}