{"id":20834,"date":"2024-11-04T10:07:18","date_gmt":"2024-11-04T13:07:18","guid":{"rendered":"https:\/\/ostec.blog\/?p=20834"},"modified":"2024-11-04T10:07:18","modified_gmt":"2024-11-04T13:07:18","slug":"cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/","title":{"rendered":"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge"},"content":{"rendered":"<p>CVE-2024-48904 es una vulnerabilidad que se encuentra en el producto Trend Micro Cloud Edge, una soluci\u00f3n de seguridad ampliamente utilizada en redes corporativas para proteger el tr\u00e1fico entrante y saliente. Este fallo de seguridad afecta a las versiones 5.6 SP2 y 7.0 del producto. Con una puntuaci\u00f3n CVSS de 9,8, la vulnerabilidad se clasifica como grave y requiere atenci\u00f3n inmediata.<\/p>\n<h2>Detalles de la vulnerabilidad<\/h2>\n<p>Esta vulnerabilidad est\u00e1 directamente relacionada con la inyecci\u00f3n de comandos, que ocurre cuando un atacante logra enviar datos manipulados que el sistema interpreta incorrectamente como comandos. Espec\u00edficamente, en CVE-2024-48904, esto da como resultado la capacidad de ejecuci\u00f3n remota de c\u00f3digo (RCE). Este tipo de falla permite a los atacantes ejecutar comandos arbitrarios en sistemas vulnerables, lo que puede llevar al compromiso total del entorno afectado.<\/p>\n<p>El origen del problema radica en la inadecuada neutralizaci\u00f3n de los elementos especiales utilizados en un comando. Cuando no existe un filtro o un procesamiento correcto de los datos de entrada, el sistema procesa los comandos ingresados \u200b\u200bpor un atacante como si fueran leg\u00edtimos, lo que hace posible la explotaci\u00f3n. Este tipo de ataque puede resultar devastador, ya que puede realizarse de forma remota, sin necesidad de autenticaci\u00f3n previa, aumentando el riesgo de invasi\u00f3n.<\/p>\n<h2>Productos afectados<\/h2>\n<p>Los productos afectados incluyen Trend Micro Cloud Edge versiones 5.6 SP2 y 7.0, seg\u00fan lo identificado en los informes de seguridad de la empresa. Este dispositivo, dise\u00f1ado para proteger las redes de ataques externos, ir\u00f3nicamente se convierte en blanco de ataques si se explota la vulnerabilidad.<\/p>\n<h2>Criticidad e impacto<\/h2>\n<p>Con puntuaci\u00f3n <a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/cve-y-cvss-para-la-clasificacion-de-vulnerabilidades-de-seguridad-digital\/\">CVSS<\/a> 9.8, esta vulnerabilidad se encuentra entre las m\u00e1s cr\u00edticas, en gran parte debido a su facilidad de explotaci\u00f3n. Como no requiere autenticaci\u00f3n y puede explotarse de forma remota, un atacante exitoso puede obtener control total sobre el sistema, realizando acciones como instalar malware, robar datos confidenciales o interrumpir operaciones.<\/p>\n<p>Adem\u00e1s, dado que Trend Micro Cloud Edge es una soluci\u00f3n que protege los entornos corporativos, un exploit exitoso podr\u00eda comprometer redes enteras, afectando servidores y dispositivos conectados.<\/p>\n<h2>Mitigaci\u00f3n y correcci\u00f3n<\/h2>\n<p>Trend Micro ya ha lanzado actualizaciones para solucionar este fallo de seguridad. La compa\u00f1\u00eda recomienda que todos los clientes actualicen inmediatamente a las \u00faltimas versiones, que incluyen la soluci\u00f3n para esta vulnerabilidad. La aplicaci\u00f3n del parche es esencial para proteger el sistema contra ataques que aprovechen esta falla.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2024-48904 es una vulnerabilidad que se encuentra en el producto Trend Micro Cloud Edge, una soluci\u00f3n de seguridad ampliamente utilizada en redes corporativas para proteger el tr\u00e1fico entrante y saliente. Este fallo de seguridad afecta a las versiones 5.6 SP2 y 7.0 del producto. Con una puntuaci\u00f3n CVSS de 9,8, la vulnerabilidad se clasifica como [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":20821,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019],"tags":[1778],"class_list":["post-20834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","tag-cve-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"CVE-2024-48904 es una vulnerabilidad que se encuentra en el producto Trend Micro Cloud Edge, una soluci\u00f3n de seguridad ampliamente utilizada en redes corporativas para proteger el tr\u00e1fico entrante y saliente. Este fallo de seguridad afecta a las versiones 5.6 SP2 y 7.0 del producto. Con una puntuaci\u00f3n CVSS de 9,8, la vulnerabilidad se clasifica como [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-04T13:07:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge\",\"datePublished\":\"2024-11-04T13:07:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/\"},\"wordCount\":423,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg\",\"keywords\":[\"cve\"],\"articleSection\":[\"Gen\u00e9rico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/\",\"name\":\"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg\",\"datePublished\":\"2024-11-04T13:07:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg\",\"width\":928,\"height\":534,\"caption\":\"CVE-2024-48904\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/","og_locale":"es_ES","og_type":"article","og_title":"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge - OSTEC | Seguran\u00e7a digital de resultados","og_description":"CVE-2024-48904 es una vulnerabilidad que se encuentra en el producto Trend Micro Cloud Edge, una soluci\u00f3n de seguridad ampliamente utilizada en redes corporativas para proteger el tr\u00e1fico entrante y saliente. Este fallo de seguridad afecta a las versiones 5.6 SP2 y 7.0 del producto. Con una puntuaci\u00f3n CVSS de 9,8, la vulnerabilidad se clasifica como [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2024-11-04T13:07:18+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge","datePublished":"2024-11-04T13:07:18+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/"},"wordCount":423,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg","keywords":["cve"],"articleSection":["Gen\u00e9rico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/","url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/","name":"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg","datePublished":"2024-11-04T13:07:18+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/10\/CVE-2024-48904.jpg","width":928,"height":534,"caption":"CVE-2024-48904"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-48904-vulnerabilidade-de-injecao-de-comando-rce-no-trend-micro-cloud-edge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"CVE-2024-48904: Vulnerabilidade de inje\u00e7\u00e3o de comando RCE no Trend Micro Cloud Edge"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=20834"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/20821"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=20834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=20834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=20834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}