{"id":841,"date":"2019-05-10T07:44:41","date_gmt":"2019-05-10T05:44:41","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=841"},"modified":"2020-07-24T11:29:21","modified_gmt":"2020-07-24T09:29:21","slug":"10kblaze-sap-security","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/","title":{"rendered":"10KBLAZE and SAP Security I: All Quiet on the Western Front"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-842 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/Hacker-300x200.jpg\" alt=\"10KBLAZE and SAP Security\" width=\"300\" height=\"200\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/Hacker-300x200.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/Hacker-768x512.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/Hacker-1024x683.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/Hacker.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Since May 2, 2019, the market for SAP security has known only one topic: the 10KBLAZE exploit toolkit, which has even prompted a warning from the U.S. Department of Homeland Security. Upon closer examination, however, it quickly becomes apparent that there\u2019s not much news to report.<\/p>\n<p><!--more--><\/p>\n<p>It starts with the security flaws that form part of the toolkit \u2013 SAP Gateway, for example, and the reginfo and secinfo files. The default setting of this file can actually be exploited by the 10KBLAZE toolkit and would then allow access to the operating system of the server on which SAP is running. What&#8217;s more, the host gets (almost) unlimited admin rights. This is highly dangerous, as failing to modify the files in question presents more than just a tiny back door; it\u2019s practically a huge swinging gate that rolls out the red carpet for would-be hackers.<\/p>\n<h2><strong>10KBLAZE: Focusing on SAP security<\/strong><\/h2>\n<p>Meanwhile, this flaw has already been a known quantity for years. In 2012, SAP itself held a public demonstration of this potential exploit to show how important it was to address it as quickly as possible.<\/p>\n<p>The fact that the researchers who discovered 10KBLAZE still managed to find more than a thousand vulnerable SAP routers in the United States (and over 700 in Germany) is definitely alarming, considered that this flaw has been well-known for more than seven years. That said, it&#8217;s important to keep these figures in perspective: SAP claims to have over 380,000 customers, after all. Even if you subtract its cloud and hosting customers, the number of exposed SAP installations likely corresponds to a single-digit percentage at most.<\/p>\n<p>Still, there&#8217;s a very good reason to take the 10KBLAZE exploit seriously. Since it&#8217;s described as a toolkit system, the threat it presents is, of course, of an entirely different nature.<\/p>\n<h2><strong>Fix the security flaws in SAP systems now and implement real-time monitoring<\/strong><\/h2>\n<p>SAP customers should be sure to check whether their systems exhibit one of the security vulnerabilities in question (further information is available on the website of the <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/AA19-122A\">U.S. Department of Homeland Security<\/a>). If they do, simply modifying some parameters will unfortunately not always do the trick. The aforementioned secinfo file in particular (and the corresponding reginfo file) should be filled with host addresses that actually can access the SAP system in question. Finding out what these are, however, is often a complex affair.<\/p>\n<p>This is where our <a href=\"https:\/\/www.sast-solutions.de\/sast-suite\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SUITE<\/a> comes in, offering a series of modules that automatically test and assess your security status \u2013 and can also perform a general analysis of your SAP system&#8217;s security settings. You can also monitor your SAP system for security risks in real time. In other words, if someone tries to let 10KBLAZE loose in your system, SAST will make sure you&#8217;re the first to know.<\/p>\n<p>Do you think these vulnerabilities might apply to you? Would you like to find out more about comprehensive protection of your SAP systems? Check out our <a href=\"https:\/\/sast-solutions.de\/index-2.jsp\">SAST SOLUTIONS website<\/a> or send us an e-mail at <a href=\"mailto:sast@akquinet.de\">sast@akquinet.de<\/a>.<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-690\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/10\/Autor_Patrick_Boch-300x200.jpg\" alt=\"SAST SOLUTIONS Patrick Boch\" width=\"300\" height=\"200\" \/><br \/>\nPatrick Boch (Product Manager SAST SOLUTIONS)<\/strong><strong>\u00a0<\/strong><\/p>\n<h2><strong>Related articles in the SAST BLOG:<\/strong><\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/01\/07\/sap-systems-insider-attacks\/\">Study shows SAP systems especially prone to insider attacks<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/02\/01\/step-by-step-secure-sap-gateway\/\">One step at a time: How to secure and harden your SAP Gateway<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since May 2, 2019, the market for SAP security has known only one topic: the 10KBLAZE exploit toolkit, which has even prompted a warning from the U.S. Department of Homeland Security. Upon closer examination, however, it quickly becomes apparent that there\u2019s not much news to report.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[25,58,61,80],"class_list":["post-841","post","type-post","status-publish","format-standard","hentry","category-sap-threat-detection","tag-cyber-attack","tag-real-time-monitoring","tag-rfc-interface","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10KBLAZE and SAP Security I: All Quiet on the Western Front<\/title>\n<meta name=\"description\" content=\"The relevance of SAP security is not new. Nor does it mean that hackers are looking for new ways to hack into SAP systems, e.g. with the 10KBLAZE Exploit construction kit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10KBLAZE and SAP Security I: All Quiet on the Western Front\" \/>\n<meta property=\"og:description\" content=\"The relevance of SAP security is not new. Nor does it mean that hackers are looking for new ways to hack into SAP systems, e.g. with the 10KBLAZE Exploit construction kit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-10T05:44:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T09:29:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/Hacker-300x200.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"The relevance of SAP security is not new. Nor does it mean that hackers are looking for new ways to hack into SAP systems, e.g. with the 10KBLAZE Exploit construction kit.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"10KBLAZE and SAP Security I: All Quiet on the Western Front\",\"datePublished\":\"2019-05-10T05:44:41+00:00\",\"dateModified\":\"2020-07-24T09:29:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/\"},\"wordCount\":552,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Hacker-300x200.jpg\",\"keywords\":[\"Cyber Attack\",\"Real-time monitoring\",\"RFC Interface\",\"SAP Security\"],\"articleSection\":[\"SAP Threat Detection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/\",\"name\":\"10KBLAZE and SAP Security I: All Quiet on the Western Front\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Hacker-300x200.jpg\",\"datePublished\":\"2019-05-10T05:44:41+00:00\",\"dateModified\":\"2020-07-24T09:29:21+00:00\",\"description\":\"The relevance of SAP security is not new. Nor does it mean that hackers are looking for new ways to hack into SAP systems, e.g. with the 10KBLAZE Exploit construction kit.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Hacker-300x200.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Hacker-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/10\\\/10kblaze-sap-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10KBLAZE and SAP Security I: All Quiet on the Western Front\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10KBLAZE and SAP Security I: All Quiet on the Western Front","description":"The relevance of SAP security is not new. Nor does it mean that hackers are looking for new ways to hack into SAP systems, e.g. with the 10KBLAZE Exploit construction kit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/","og_locale":"en_US","og_type":"article","og_title":"10KBLAZE and SAP Security I: All Quiet on the Western Front","og_description":"The relevance of SAP security is not new. Nor does it mean that hackers are looking for new ways to hack into SAP systems, e.g. with the 10KBLAZE Exploit construction kit.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/","og_site_name":"SAST BLOG","article_published_time":"2019-05-10T05:44:41+00:00","article_modified_time":"2020-07-24T09:29:21+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/Hacker-300x200.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_description":"The relevance of SAP security is not new. Nor does it mean that hackers are looking for new ways to hack into SAP systems, e.g. with the 10KBLAZE Exploit construction kit.","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"10KBLAZE and SAP Security I: All Quiet on the Western Front","datePublished":"2019-05-10T05:44:41+00:00","dateModified":"2020-07-24T09:29:21+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/"},"wordCount":552,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/Hacker-300x200.jpg","keywords":["Cyber Attack","Real-time monitoring","RFC Interface","SAP Security"],"articleSection":["SAP Threat Detection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/","url":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/","name":"10KBLAZE and SAP Security I: All Quiet on the Western Front","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/Hacker-300x200.jpg","datePublished":"2019-05-10T05:44:41+00:00","dateModified":"2020-07-24T09:29:21+00:00","description":"The relevance of SAP security is not new. Nor does it mean that hackers are looking for new ways to hack into SAP systems, e.g. with the 10KBLAZE Exploit construction kit.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/Hacker-300x200.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/Hacker-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/10\/10kblaze-sap-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"10KBLAZE and SAP Security I: All Quiet on the Western Front"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=841"}],"version-history":[{"count":8,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/841\/revisions"}],"predecessor-version":[{"id":1332,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/841\/revisions\/1332"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}