{"id":1304,"date":"2021-03-16T18:34:10","date_gmt":"2021-03-16T13:04:10","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1304"},"modified":"2021-06-07T11:00:29","modified_gmt":"2021-06-07T05:30:29","slug":"new-poc-microsoft-exchange-bug-that-enhances-new-attacks","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/","title":{"rendered":"New POC Microsoft Exchange Bug That Enhances New Attacks!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Another proof of concept has been released that discovered the new exploit in Microsoft Exchange that needs some modifications while running the web shells and make the server more vulnerable and active the ProxtLogon vulnerability.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Since Microsoft shared the details about this new exploit present in Microsoft Exchange security that also named as ProxyLogon, the admins and the researchers are analyzing the vulnerability while protecting the server that was exposed on the Internet.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How this Started?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">These attacks use web shells, crypto miners, and other versions of DearCry ransomware that were already activated in the server. The security researcher also shared all the relevant information that contains the details of the proof of concept exploit of ProxyLogon vulnerability.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">This all started, when the experts are performing the test that is not executed correctly and they will crash after some errors are spotted in the reader. However, that PoC is also driven by the accurate information that the researcher and the attackers used while establishing the remote connection that could exploit of vulnerability present in Microsoft Exchange servers.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">After the PoC got published the researcher also got the email from Microsoft that state these proof are taken down because they violated the user policies.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Whereas GitHub stated that they took down the PoC while protecting other devices that can be exploited using this information. They also added that <\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">\u201cWe are totally understand that the researcher that published and distribute this proof of concept that contains the exploit code and other research value of the community may risk our safe ecosystems and it also penetrate our balance. While maintaing the user privacy and safety, GitHub take down all the reports or any information that contains the detail of PoC.\u201d<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Happened Next?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">This weekend, another research published the new or updated vulnerability that needs some little modification while exploiting the vulnerability present in Microsoft server and web shell. According to the security researched the Vulnerability is ready to be exploited by doing some modification. The researcher also shared an image in which they can exploit the vulnerability and establish the remote connection using the webshell and with the help of\u00a0<strong>the whoami<\/strong>\u00a0command that they used.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"226\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-1-1024x226.jpg\" alt=\"New POC Microsoft Exchange Bug That Enhances New Attacks!\" class=\"wp-image-1305\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-1-1024x226.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-1-300x66.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-1-768x169.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-1-1536x339.jpg 1536w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-1.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">The security research also shared another image that shows that the test was successfully executed in the selected location on the server.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"284\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-2-1024x284.jpg\" alt=\"New POC Microsoft Exchange Bug That Enhances New Attacks!\" class=\"wp-image-1306\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-2-1024x284.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-2-300x83.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-2-768x213.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-image-2.jpg 1354w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">Multiple researchers also verified these tests against the Microsoft Exchange server but didn\u2019t verify the PoC. They also said that they tested the new PoC that remained unpatched from<\/p><\/p>\n\n\n\n<p>2016 and not fixed yet.<\/p>\n\n\n\n<p><p style=\"text-align: justify\">They are agreed with the assessment executed by other researchers and also said that the PoC makes it easier for the attackers to execute such attacks on the Microsoft Exchange server respectively.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Various vulnerabilities are present in the server makes it more exploitable on the Internet.<\/p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Other Vulnerabilities Present on Microsoft Exchange Server<\/strong><\/h3>\n\n\n\n<p><p style=\"text-align: justify\">According to the investigation, there is more than 80,000 vulnerability are still present in the Microsoft Exchange server that is publicly availed and the most important part is that the administrator is haven\u2019t applied the complete patch.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The number of vulnerabilities running on the Old server of Exchange may not directly be patched with the security update which is estimated from 125,000 to 80,000 according to the test conducted between March 8 and 11.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Whereas Microsoft also warned the users to drop this vulnerability and applied the patch that was needed. Based on the reports of an organization named RiskIQ, there are total no of vulnerability present is near about 400,000 and these are rapidly increasing as the test is performing by other experts to near about 100,000 servers are still at risk. Multiple servers are still running the older version and did not apply the updated security patched.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">While maintaining user security and privacy, Microsoft also released other security updates for the users who are still running the older version of Exchange. These updates fixed 95% of the servers that were exposed on the Internet for further attacks.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another proof of concept has been released that discovered the new exploit in Microsoft Exchange that needs some modifications while running the web shells and make the server more vulnerable and active the ProxtLogon vulnerability. Since Microsoft shared the details about this new exploit present in Microsoft Exchange security that also named as ProxyLogon, the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1494,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New POC Microsoft Exchange Bug That Enhances New Attacks! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New POC Microsoft Exchange Bug That Enhances New Attacks! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Another proof of concept has been released that discovered the new exploit in Microsoft Exchange that needs some modifications while running the web shells and make the server more vulnerable and active the ProxtLogon vulnerability. Since Microsoft shared the details about this new exploit present in Microsoft Exchange security that also named as ProxyLogon, the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-16T13:04:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:30:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"New POC Microsoft Exchange Bug That Enhances New Attacks!\",\"datePublished\":\"2021-03-16T13:04:10+00:00\",\"dateModified\":\"2021-06-07T05:30:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/\"},\"wordCount\":664,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/\",\"url\":\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/\",\"name\":\"New POC Microsoft Exchange Bug That Enhances New Attacks! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-03-16T13:04:10+00:00\",\"dateModified\":\"2021-06-07T05:30:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New POC Microsoft Exchange Bug That Enhances New Attacks!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New POC Microsoft Exchange Bug That Enhances New Attacks! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/","og_locale":"en_US","og_type":"article","og_title":"New POC Microsoft Exchange Bug That Enhances New Attacks! - Xiarch Solutions Private Limited","og_description":"Another proof of concept has been released that discovered the new exploit in Microsoft Exchange that needs some modifications while running the web shells and make the server more vulnerable and active the ProxtLogon vulnerability. Since Microsoft shared the details about this new exploit present in Microsoft Exchange security that also named as ProxyLogon, the [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-03-16T13:04:10+00:00","article_modified_time":"2021-06-07T05:30:29+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/new-poc-microsoft-exchange-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"New POC Microsoft Exchange Bug That Enhances New Attacks!","datePublished":"2021-03-16T13:04:10+00:00","dateModified":"2021-06-07T05:30:29+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/"},"wordCount":664,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/","url":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/","name":"New POC Microsoft Exchange Bug That Enhances New Attacks! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-03-16T13:04:10+00:00","dateModified":"2021-06-07T05:30:29+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/new-poc-microsoft-exchange-bug-that-enhances-new-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"New POC Microsoft Exchange Bug That Enhances New Attacks!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1304"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1304"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1304\/revisions"}],"predecessor-version":[{"id":1308,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1304\/revisions\/1308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1494"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}