	{"id":29782,"date":"2014-07-08T12:32:36","date_gmt":"2014-07-08T19:32:36","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=29782"},"modified":"2014-07-08T12:32:36","modified_gmt":"2014-07-08T19:32:36","slug":"adobe-flash-player-update-combats-rosetta-flash-attack","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/","title":{"rendered":"Adobe Flash Player Update Combats Rosetta Flash Attack"},"content":{"rendered":"<div id=\"attachment_29824\" style=\"width: 190px\" class=\"wp-caption alignright\"><img aria-describedby=\"caption-attachment-29824\" loading=\"lazy\" class=\"alignright size-full wp-image-29824\" alt=\"Abusing JSONP with Rosetta Flash\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/07\/Rosetta-Flash-attack.png\" width=\"180\" height=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/07\/Rosetta-Flash-attack.png 180w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/07\/Rosetta-Flash-attack-135x150.png 135w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/><p id=\"caption-attachment-29824\" class=\"wp-caption-text\">Image credit: Michele Spagnuolo<\/p><\/div>\n<p>Adobe Systems has released Adobe Flash Player version 14.0.0.145 for Mac and Windows. Adobe pushed a fix in the Flash Player update that removes a security vulnerability (CVE-2014-4671), which could be used to abuse JSONP endpoints by making a victim perform arbitrary requests to vulnerable domains and expose sensitive data.<\/p>\n<p>Security researcher Michele Spagnuolo disclosed the vulnerability by first notifying affected companies before releasing the code and publishing further details about it.\u00a0On <a title=\"Abusing JSONP with Rosetta Flash\" href=\"http:\/\/miki.it\/blog\/2014\/7\/8\/abusing-jsonp-with-rosetta-flash\/\" target=\"_blank\">his blog<\/a>, Michele explained that\u00a0abusing JSONP endpoints could be done by using Rosetta Flash, &#8220;a tool for converting any SWF file to one composed of only alphanumeric characters in order to abuse JSONP endpoints, making a victim perform arbitrary requests to the domain with the vulnerable endpoint and exfiltrate potentially sensitive data.&#8221;<\/p>\n<p>For those interested in learning more about Rosetta Flash, Michele published a set of <a title=\"Abusing JSONP with Rosetta Flash (PDF)\" href=\"http:\/\/miki.it\/RosettaFlash\/RosettaFlash.pdf\" target=\"_blank\">comprehensive slides (PDF)<\/a>. In the slides, he outlines the Rosetta Flash attack scenario.<\/p>\n<blockquote><p>1. The attacker controls the first bytes of the output of a JSONP API endpoint by specifying the callback parameter in the request.<\/p>\n<p>2. SWF files can be embedded using an &lt;object&gt; tag and will be executed as Flash as long as the content looks like a valid Flash file.<\/p>\n<p style=\"padding-left: 30px;\">&lt;object type=&#8221;application\/x-shockwave-flash&#8221; data=&#8221;<strong>https:\/\/accounts.google.com\/RatePassword?<\/strong><strong>callback=<span style=\"color: #ff0000;\">CWSxx&#8230;<\/span><\/strong>&#8220;&gt;&lt;\/object&gt;<\/p>\n<p>3. Flash can perform GET and POST requests to the hosting domain with the victim&#8217;s cookies and exfiltrate data.<\/p><\/blockquote>\n<p>The security researcher is scheduled to present the vulnerability at <a title=\"HITB2014KUL Conference Speakers\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2014kul\/conference-speakers\/\" target=\"_blank\">Hack In The Box: Malaysia<\/a> in October, and the Rosetta Flash technology will be featured in the next\u00a0<a href=\"http:\/\/openwall.info\/wiki\/people\/solar\/pocorgtfo\" target=\"_blank\">PoC||GTFO<\/a>\u00a0release.<\/p>\n<p>According to Adobe&#8217;s security bulletin (<a title=\"Adobe Security Bulletin (APSB14-17)\" href=\"http:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb14-17.html\" target=\"_blank\">APSB14-17<\/a>), Adobe Flash Player 14.0.0.145 addresses the following critical vulnerabilities:<\/p>\n<ul>\n<li>These updates include additional validation checks to ensure that Flash Player rejects malicious content from vulnerable JSONP callback APIs (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-4671\" target=\"_blank\">CVE-2014-4671<\/a>).<\/li>\n<li>These updates resolve security bypass vulnerabilities (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0537\" target=\"_blank\">CVE-2014-0537<\/a>, <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0539\" target=\"_blank\">CVE-2014-0539<\/a>).<\/li>\n<\/ul>\n<p>Users of Adobe Flash Player 14.0.0.125 and earlier versions for Mac and Windows should update to\u00a0<a title=\"Adobe - Install Adobe Flash Player\" href=\"http:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">Adobe Flash Player 14.0.0.145<\/a>\u00a0as soon as possible. Users of Adobe Flash Player 11.2.202.378 and earlier versions for Linux should update to Adobe Flash Player 11.2.202.394.\u00a0Adobe Flash Player 14.0.0.125 installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 14.0.0.145 for Windows, Mac and Linux.\u00a0Users of Adobe AIR 14.0.0.110 and earlier versions should update to\u00a0<a title=\"Adobe - Get Adobe AIR\" href=\"http:\/\/get.adobe.com\/air\/\" target=\"_blank\">Adobe AIR 14.0.0.137<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adobe Systems has released Adobe Flash Player version 14.0.0.145 for Mac and Windows. Adobe pushed a fix in the Flash Player update that removes a security vulnerability (CVE-2014-4671), which could be used to abuse JSONP endpoints by making a victim perform arbitrary requests to vulnerable domains and expose sensitive data. Security researcher Michele Spagnuolo disclosed [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9909,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[15,1258,1252,1255],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Adobe Systems has released Adobe Flash Player version 14.0.0.145 for Mac and Windows. Adobe pushed a fix in the Flash Player update that removes a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe Flash Player Update Combats Rosetta Flash Attack - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Adobe Systems has released Adobe Flash Player version 14.0.0.145 for Mac and Windows. Adobe pushed a fix in the Flash Player update that removes a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-08T19:32:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Adobe software security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/\",\"name\":\"Adobe Flash Player Update Combats Rosetta Flash Attack - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#primaryimage\"},\"datePublished\":\"2014-07-08T19:32:36+00:00\",\"dateModified\":\"2014-07-08T19:32:36+00:00\",\"description\":\"Adobe Systems has released Adobe Flash Player version 14.0.0.145 for Mac and Windows. Adobe pushed a fix in the Flash Player update that removes a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe Flash Player Update Combats Rosetta Flash Attack\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Adobe Flash Player Update Combats Rosetta Flash Attack\",\"datePublished\":\"2014-07-08T19:32:36+00:00\",\"dateModified\":\"2014-07-08T19:32:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#webpage\"},\"wordCount\":412,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png\",\"keywords\":[\"Adobe\",\"Adobe Flash Player 14.0.0.145\",\"CVE-2014-4671\",\"Rosetta Flash\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Adobe Systems has released Adobe Flash Player version 14.0.0.145 for Mac and Windows. Adobe pushed a fix in the Flash Player update that removes a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/","og_locale":"en_US","og_type":"article","og_title":"Adobe Flash Player Update Combats Rosetta Flash Attack - The Mac Security Blog","og_description":"Adobe Systems has released Adobe Flash Player version 14.0.0.145 for Mac and Windows. Adobe pushed a fix in the Flash Player update that removes a","og_url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-07-08T19:32:36+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","width":"400","height":"260","caption":"Adobe software security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/","name":"Adobe Flash Player Update Combats Rosetta Flash Attack - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#primaryimage"},"datePublished":"2014-07-08T19:32:36+00:00","dateModified":"2014-07-08T19:32:36+00:00","description":"Adobe Systems has released Adobe Flash Player version 14.0.0.145 for Mac and Windows. Adobe pushed a fix in the Flash Player update that removes a","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Adobe Flash Player Update Combats Rosetta Flash Attack"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Adobe Flash Player Update Combats Rosetta Flash Attack","datePublished":"2014-07-08T19:32:36+00:00","dateModified":"2014-07-08T19:32:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#webpage"},"wordCount":412,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","keywords":["Adobe","Adobe Flash Player 14.0.0.145","CVE-2014-4671","Rosetta Flash"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-player-update-combats-rosetta-flash-attack\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Adobe-Security-Update-Tile.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-7Km","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29782"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=29782"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29782\/revisions"}],"predecessor-version":[{"id":29848,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29782\/revisions\/29848"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=29782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=29782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=29782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}