
{"id":849,"date":"2021-02-02T16:09:45","date_gmt":"2021-02-02T15:09:45","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=849"},"modified":"2021-02-02T16:09:50","modified_gmt":"2021-02-02T15:09:50","slug":"une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/","title":{"rendered":"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/BB1daQTL.img?h=450&amp;w=799&amp;m=6&amp;q=60&amp;o=f&amp;l=f\" alt=\"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root\"\/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>Un bug datant de juillet 2011 permet de contourner le contr\u00f4le d\u2019acc\u00e8s de la commande \u00ab sudo \u00bb et d\u2019obtenir les privil\u00e8ges d\u2019un administrateur.<\/strong><\/p>\n\n\n\n<p>Les chercheurs en s\u00e9curit\u00e9 de Qualys viennent de r\u00e9v\u00e9ler une importante faille dans les syst\u00e8mes Linux, et plus pr\u00e9cis\u00e9ment dans la commande \u00ab&nbsp;sudo&nbsp;\u00bb.<\/p>\n\n\n\n<p>Elle permet aux utilisateurs d\u2019augmenter momentan\u00e9ment leurs privil\u00e8ges pour r\u00e9aliser certaines t\u00e2ches sensibles. Elle n\u00e9cessite \u00e9videmment un mot de passe d\u2019administrateur pour fonctionner. Mais en raison d\u2019un bug de type&nbsp;<em>\u00ab&nbsp;d\u00e9passement de m\u00e9moire<\/em>&nbsp;heap<em>&nbsp;\u00bb<\/em>, il est possible de contourner ce contr\u00f4le d\u2019acc\u00e8s. Les chercheurs ont d\u00e9montr\u00e9 l\u2019attaque dans une vid\u00e9o.<\/p>\n\n\n\n<p>D\u2019apr\u00e8s l\u2019historique du code de \u00ab&nbsp;sudo&nbsp;\u00bb, cette faille date de juillet 2011. Elle a pu \u00eatre v\u00e9rifi\u00e9e dans toutes les principales distributions r\u00e9centes telles qu\u2019Ubuntu 20.04, Debian 10, Fedora 33.<\/p>\n\n\n\n<p>Pour \u00eatre certain de ne pas \u00eatre affect\u00e9, il faut v\u00e9rifier le num\u00e9ro de version de \u00ab&nbsp;sudo&nbsp;\u00bb qui doit \u00eatre sup\u00e9rieur ou \u00e9gal \u00e0 1.9.5p2. Il est \u00e9galement possible de r\u00e9aliser un test en tapant la commande suivante&nbsp;:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>sudoedit -s \u2019\\&rsquo; `perl -e &lsquo;print \u00ab\u00a0A\u00a0\u00bb x 65536&rsquo;`<\/em><\/p><\/blockquote>\n\n\n\n<p>Si le r\u00e9sultat est une erreur de segmentation, alors le logiciel est vuln\u00e9rable.<\/p>\n\n\n\n<p>\u00c9videmment, cette vuln\u00e9rabilit\u00e9 est particuli\u00e8rement emb\u00eatante pour tous ces objets connect\u00e9s qui fonctionnent sous Linux et qu\u2019il n\u2019est pas toujours possible de mettre \u00e0 jour. La seule solution est alors de s\u2019en d\u00e9barrasser ou de&nbsp;<a href=\"https:\/\/www.01net.com\/astuces\/comment-securiser-son-reseau-domestique-avec-un-raspberry-pi-3-1532277.html\" target=\"_blank\" rel=\"noreferrer noopener\">les isoler dans un r\u00e9seau sp\u00e9cial<\/a>.<\/p>\n\n\n\n<p><strong>Sources&nbsp;<\/strong>:&nbsp;<a href=\"https:\/\/blog.qualys.com\/vulnerabilities-research\/2021\/01\/26\/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit\" target=\"_blank\" rel=\"noreferrer noopener\">Qualys<\/a>,&nbsp;<a href=\"https:\/\/www.sudo.ws\/alerts\/unescape_overflow.html\" target=\"_blank\" rel=\"noreferrer noopener\">Sudo.ws<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un bug datant de juillet 2011 permet de contourner le contr\u00f4le d\u2019acc\u00e8s de la commande \u00ab sudo \u00bb et d\u2019obtenir les privil\u00e8ges d\u2019un administrateur. Les chercheurs en s\u00e9curit\u00e9 de Qualys [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":850,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11,59],"tags":[],"class_list":["post-849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite","category-systemes"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"Un bug datant de juillet 2011 permet de contourner le contr\u00f4le d\u2019acc\u00e8s de la commande \u00ab sudo \u00bb et d\u2019obtenir les privil\u00e8ges d\u2019un administrateur. Les chercheurs en s\u00e9curit\u00e9 de Qualys [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-02T15:09:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-02T15:09:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root\",\"datePublished\":\"2021-02-02T15:09:45+00:00\",\"dateModified\":\"2021-02-02T15:09:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/\"},\"wordCount\":301,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pt-4.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\",\"Syst\u00e8mes\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/\",\"name\":\"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pt-4.jpg\",\"datePublished\":\"2021-02-02T15:09:45+00:00\",\"dateModified\":\"2021-02-02T15:09:50+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pt-4.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pt-4.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/02\\\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/","og_locale":"fr_FR","og_type":"article","og_title":"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root - Parlons Techs - Store","og_description":"Un bug datant de juillet 2011 permet de contourner le contr\u00f4le d\u2019acc\u00e8s de la commande \u00ab sudo \u00bb et d\u2019obtenir les privil\u00e8ges d\u2019un administrateur. Les chercheurs en s\u00e9curit\u00e9 de Qualys [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-02-02T15:09:45+00:00","article_modified_time":"2021-02-02T15:09:50+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-4.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root","datePublished":"2021-02-02T15:09:45+00:00","dateModified":"2021-02-02T15:09:50+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/"},"wordCount":301,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-4.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9","Syst\u00e8mes"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/","url":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/","name":"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-4.jpg","datePublished":"2021-02-02T15:09:45+00:00","dateModified":"2021-02-02T15:09:50+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-4.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-4.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/02\/une-faille-linux-vieille-de-dix-ans-permet-a-nimporte-qui-de-devenir-root\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Une faille Linux vieille de dix ans permet \u00e0 n\u2019importe qui de devenir root"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=849"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/849\/revisions"}],"predecessor-version":[{"id":851,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/849\/revisions\/851"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/850"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}