{"id":20930,"date":"2024-12-11T10:00:36","date_gmt":"2024-12-11T13:00:36","guid":{"rendered":"https:\/\/ostec.blog\/?p=20930"},"modified":"2024-12-11T10:00:36","modified_gmt":"2024-12-11T13:00:36","slug":"cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/","title":{"rendered":"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada"},"content":{"rendered":"<p>CVE-2024-49039 es una vulnerabilidad de elevaci\u00f3n de privilegios en el Programador de tareas de Windows. Identificada con una puntuaci\u00f3n <a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/cve-y-cvss-para-la-clasificacion-de-vulnerabilidades-de-seguridad-digital\/\">CVSS<\/a> de 8,8 (alta gravedad), permite una Un atacante local sin privilegios aumenta su nivel de acceso al sistema. La falla est\u00e1 asociada con CWE-287, en la que las credenciales o permisos se administran de manera inapropiada, lo que permite el acceso no autorizado a recursos protegidos.<\/p>\n<h2>\u00bfQu\u00e9 es el Programador de tareas de Windows?<\/h2>\n<p>El Programador de tareas de Windows es una herramienta integrada en el sistema operativo Windows que te permite automatizar la ejecuci\u00f3n de tareas en tu computadora. Permite a los usuarios programar acciones espec\u00edficas, como abrir aplicaciones, enviar notificaciones o realizar mantenimiento del sistema, en horarios establecidos o en funci\u00f3n de eventos.<\/p>\n<p>Esta funcionalidad es ampliamente utilizada para optimizar rutinas administrativas, como <a href=\"https:\/\/ostec.blog\/es\/generico\/invertir-backup-datos\/\">copias de seguridad<\/a>, actualizaciones y monitoreo del sistema. A trav\u00e9s de su interfaz gr\u00e1fica o la l\u00ednea de comandos, podr\u00e1s crear, editar y gestionar tareas personalizadas, configurando desencadenantes y condiciones espec\u00edficas.<\/p>\n<p>En el contexto de la seguridad, el Programador de tareas es un componente cr\u00edtico, ya que su mal uso o explotaci\u00f3n puede comprometer la integridad del sistema. Las vulnerabilidades relacionadas con \u00e9l, como CVE-2024-49039, resaltan la importancia de mantenerlo protegido y actualizado.<\/p>\n<h2>Productos afectados<\/h2>\n<p>Esta vulnerabilidad afecta a varias versiones de Windows, incluidas:<\/p>\n<ul>\n<li>Windows 10 (varias ediciones, hasta 22H2).<\/li>\n<li>Windows 11 (hasta 24H2).<\/li>\n<li>Windows Server 2016, 2019, 2022 y 2025, en m\u00faltiples versiones.<\/li>\n<\/ul>\n<p>Se consideran vulnerables las versiones anteriores a las actualizaciones mencionadas en los boletines de seguridad.<\/p>\n<h2>Operaci\u00f3n e impacto<\/h2>\n<p>El error se produce debido a un problema con la gesti\u00f3n de permisos del Programador de tareas. Un atacante local podr\u00eda aprovechar la falla para ejecutar comandos o programas con privilegios elevados, comprometiendo la integridad, confidencialidad y disponibilidad del sistema. Este tipo de vulnerabilidad es particularmente peligrosa porque puede usarse como parte de una cadena de ataque m\u00e1s compleja, lo que permite a los actores maliciosos escalar sus privilegios para escalar acciones da\u00f1inas.<\/p>\n<h2>Explotaci\u00f3n activa<\/h2>\n<p>Seg\u00fan informes de Microsoft y CISA, la vulnerabilidad se est\u00e1 explotando activamente en ataques reales. Esto aumenta significativamente la urgencia de aplicar soluciones y medidas de mitigaci\u00f3n.<\/p>\n<h2>Correcci\u00f3n y mitigaci\u00f3n<\/h2>\n<p>Microsoft ha publicado actualizaciones para resolver la falla como parte del ciclo de parches de noviembre de 2024. Los usuarios y administradores deben aplicar las actualizaciones de inmediato para minimizar el riesgo. Adem\u00e1s, se recomienda monitorear el entorno para detectar actividades sospechosas, especialmente en sistemas que a\u00fan no han recibido parches.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2024-49039 es una vulnerabilidad de elevaci\u00f3n de privilegios en el Programador de tareas de Windows. Identificada con una puntuaci\u00f3n CVSS de 8,8 (alta gravedad), permite una Un atacante local sin privilegios aumenta su nivel de acceso al sistema. La falla est\u00e1 asociada con CWE-287, en la que las credenciales o permisos se administran de manera [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":20918,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019],"tags":[1778],"class_list":["post-20930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","tag-cve-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"CVE-2024-49039 es una vulnerabilidad de elevaci\u00f3n de privilegios en el Programador de tareas de Windows. Identificada con una puntuaci\u00f3n CVSS de 8,8 (alta gravedad), permite una Un atacante local sin privilegios aumenta su nivel de acceso al sistema. La falla est\u00e1 asociada con CWE-287, en la que las credenciales o permisos se administran de manera [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-11T13:00:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada\",\"datePublished\":\"2024-12-11T13:00:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/\"},\"wordCount\":445,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg\",\"keywords\":[\"cve\"],\"articleSection\":[\"Gen\u00e9rico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/\",\"name\":\"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg\",\"datePublished\":\"2024-12-11T13:00:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg\",\"width\":928,\"height\":534,\"caption\":\"CVE-2024-49039\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/","og_locale":"es_ES","og_type":"article","og_title":"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada - OSTEC | Seguran\u00e7a digital de resultados","og_description":"CVE-2024-49039 es una vulnerabilidad de elevaci\u00f3n de privilegios en el Programador de tareas de Windows. Identificada con una puntuaci\u00f3n CVSS de 8,8 (alta gravedad), permite una Un atacante local sin privilegios aumenta su nivel de acceso al sistema. La falla est\u00e1 asociada con CWE-287, en la que las credenciales o permisos se administran de manera [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2024-12-11T13:00:36+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada","datePublished":"2024-12-11T13:00:36+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/"},"wordCount":445,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg","keywords":["cve"],"articleSection":["Gen\u00e9rico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/","url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/","name":"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg","datePublished":"2024-12-11T13:00:36+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-49039.jpg","width":928,"height":534,"caption":"CVE-2024-49039"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-49039-vulnerabilidad-en-el-programador-de-tareas-de-windows-esta-siendo-explotada\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"CVE-2024-49039: Vulnerabilidad en el Programador de tareas de Windows est\u00e1 siendo explotada"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=20930"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20930\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/20918"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=20930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=20930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=20930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}