{"id":21517,"date":"2020-07-16T14:31:11","date_gmt":"2020-07-16T18:31:11","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=21517"},"modified":"2022-09-06T10:57:07","modified_gmt":"2022-09-06T14:57:07","slug":"critical-remote-code-execution-rce-vulnerability-in-windows-dns-server","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/","title":{"rendered":"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe"},"content":{"rendered":"<p>The Microsoft Security Response Center identified a <a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/07\/14\/july-2020-security-update-cve-2020-1350-vulnerability-in-windows-domain-name-system-dns-server\/\">Critical Remote Code Execution (RCE) vulnerability in the Windows DNS server<\/a> (CVE-2020-1350). What is it, what\u2019s the risk, how can it be fixed and how can Sherweb help your MSP business manage it? You\u2019ve come to the right place!<\/p>\n<h2><strong>What is this Critical Remote Code Execution (RCE) vulnerability and why is it important?<\/strong><\/h2>\n<p>Microsoft doesn\u2019t often flag security vulnerabilities that require immediate action, so this situation caught our attention right away. The problem comes from a flaw in in Microsoft\u2019s Domain Name System (DNS) server implementation, wherein a <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1350\">vulnerability is created when DNS servers fail to handle requests<\/a>.<\/p>\n<h3><em><a href=\"https:\/\/info.sherweb.com\/introducing-noc-services.html\">Get ahead of security risks like this with Sherweb\u2019s NOC services<\/a><\/em><\/h3>\n<p>An RCE vulnerability is a high-risk issue because, as its name suggests, it can be exploited without an attacker being physically present. In this instance, bad actors could send harmful requests to a Windows DNS server.<\/p>\n<p>Because DNS is a highly important networking component, exploitation could cause service interruptions and compromise critical accounts for affected organizations.<\/p>\n<p>This specific vulnerability is also considered \u2018wormable\u2019, meaning it can be exploited to spread malware to other machines using Windows DNS servers. While it\u2019s not known to have been utilized in cyberattacks, the potential impacts of such activity loom large.<\/p>\n<p>The issue affects all Windows Server versions; non-Microsoft DNS servers are not affected by this vulnerability.<\/p>\n<h2><strong>What\u2019s being done about this vulnerability?<\/strong><\/h2>\n<p>Microsoft highly recommends applying the <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1350\">necessary updates<\/a> as soon as possible, which modify how Windows DNS servers handle requests. However, if you can\u2019t update your systems right away, the following <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4569509\/windows-dns-server-remote-code-execution-vulnerability\">workaround<\/a> is also available&#8230;<\/p>\n<p><span style=\"color: #ff0000;\"><strong>Make the following registry change\u00a0to restrict\u00a0the size of the largest inbound TCP-based DNS response packet that&#8217;s allowed:<\/strong><\/span><\/p>\n<ul>\n<li><strong><span style=\"color: #000000;\">Subkey: HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\DNS\\Parameters <\/span><\/strong><\/li>\n<li><strong><span style=\"color: #000000;\">Value: TcpReceivePacketSize<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #000000;\">Type: DWORD <\/span><\/strong><\/li>\n<li><strong><span style=\"color: #000000;\">Value data: 0xFF00<\/span><\/strong><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\"><strong><span style=\"text-decoration: underline;\">Notes<\/span><\/strong><\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">The default (also maximum) Value data = 0xFFFF<\/span><\/li>\n<li><span style=\"color: #000000;\">The recommended Value data = 0xFF00 (255 bytes less than the maximum)<\/span><\/li>\n<li><span style=\"color: #000000;\">Restart the DNS Service for the registry change to take effect. To do this, run the following command at an elevated command prompt: net stop dns &amp;&amp; net start dns<\/span><\/li>\n<li><span style=\"color: #000000;\">After the workaround is implemented, a Windows DNS server will be unable to resolve DNS names for its clients if the DNS response from the upstream server is larger than 65,280 bytes<\/span><\/li>\n<\/ul>\n<h2><strong>Sherweb\u2019s NOC Services keep you safe in these scenarios<\/strong><\/h2>\n<p>Finding out about this kind of security vulnerability directly from Microsoft\u2014and then following the recommended steps to resolve it\u2014is all well and good. <strong>But if you\u2019re learning about the issue from this blog, you\u2019re unfortunately behind on your response.<\/strong><\/p>\n<p>Being able to protect your clients from such vulnerabilities is a crucial step in positioning yourself as their <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/it-advisor-and-network-operations-center\/\">trusted IT advisor<\/a>. It\u2019s also a good move if you\u2019re trying to move from <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/break-fix-to-msp\/\">break-fix to MSP<\/a>, or if you\u2019re goal is to add more managed services (<a href=\"https:\/\/www.sherweb.com\/infrastructure\/\">Infrastructure-as-a-Service, for example<\/a>) to your offering.<\/p>\n<p>Sherweb\u2019s <a href=\"https:\/\/www.sherweb.com\/partner-services\/network-operations-center\/\">NOC Services<\/a> can easily make this happen for your business. Including monitoring, patching and alerting services, NOC Services ensure your clients\u2019 infrastructure is protected and that their systems stay up and running.<\/p>\n<h3><strong>How NOC Services came to the rescue for CVE-2020-1350<\/strong><\/h3>\n<ol>\n<li>Sherweb cloud experts alerted to the vulnerability<\/li>\n<li>Workaround application initiated for Sherweb partners using NOC Services or <a href=\"https:\/\/www.sherweb.com\/managed-cloud\/\">Managed Cloud<\/a><\/li>\n<li>Necessary updates scheduled during upcoming monthly maintenance for Sherweb partners<\/li>\n<li>Partners notified of vulnerability and what Sherweb is doing about it, with no action necessary on their end<\/li>\n<\/ol>\n<p>Maximize your value for clients and keep them safe at the same time! Learn more about NOC Services and how they can benefit your MSP business by taking a look at our <a href=\"https:\/\/info.sherweb.com\/introducing-noc-services.html\">detailed product sheet<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft Security Response Center identified a Critical Remote Code Execution (RCE) vulnerab","protected":false},"author":177,"featured_media":21521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[752],"tags":[],"class_list":["post-21517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-server"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe | Sherweb<\/title>\n<meta name=\"description\" content=\"The Microsoft Security Response Center identified a Critical Remote Code Execution (RCE) vulnerability in the Windows DNS server (CVE-2020-1350).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe | Sherweb\" \/>\n<meta property=\"og:description\" content=\"The Microsoft Security Response Center identified a Critical Remote Code Execution (RCE) vulnerability in the Windows DNS server (CVE-2020-1350).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-16T18:31:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-06T14:57:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/RCEvulnerability-1200x480@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe\",\"datePublished\":\"2020-07-16T18:31:11+00:00\",\"dateModified\":\"2022-09-06T14:57:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/\"},\"wordCount\":644,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/RCEvulnerability-1200x480@2x.png\",\"articleSection\":[\"Cloud Server\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/\",\"name\":\"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/RCEvulnerability-1200x480@2x.png\",\"datePublished\":\"2020-07-16T18:31:11+00:00\",\"dateModified\":\"2022-09-06T14:57:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"The Microsoft Security Response Center identified a Critical Remote Code Execution (RCE) vulnerability in the Windows DNS server (CVE-2020-1350).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/RCEvulnerability-1200x480@2x.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/RCEvulnerability-1200x480@2x.png\",\"width\":2400,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Server\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/cloud-server\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe | Sherweb","description":"The Microsoft Security Response Center identified a Critical Remote Code Execution (RCE) vulnerability in the Windows DNS server (CVE-2020-1350).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/","og_locale":"en_US","og_type":"article","og_title":"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe | Sherweb","og_description":"The Microsoft Security Response Center identified a Critical Remote Code Execution (RCE) vulnerability in the Windows DNS server (CVE-2020-1350).","og_url":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2020-07-16T18:31:11+00:00","article_modified_time":"2022-09-06T14:57:07+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/RCEvulnerability-1200x480@2x.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe","datePublished":"2020-07-16T18:31:11+00:00","dateModified":"2022-09-06T14:57:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/"},"wordCount":644,"commentCount":1,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/RCEvulnerability-1200x480@2x.png","articleSection":["Cloud Server"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/","url":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/","name":"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/RCEvulnerability-1200x480@2x.png","datePublished":"2020-07-16T18:31:11+00:00","dateModified":"2022-09-06T14:57:07+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"The Microsoft Security Response Center identified a Critical Remote Code Execution (RCE) vulnerability in the Windows DNS server (CVE-2020-1350).","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/#primaryimage","url":"\/blog\/wp-content\/uploads\/RCEvulnerability-1200x480@2x.png","contentUrl":"\/blog\/wp-content\/uploads\/RCEvulnerability-1200x480@2x.png","width":2400,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/critical-remote-code-execution-rce-vulnerability-in-windows-dns-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Server","item":"https:\/\/www.sherweb.com\/blog\/category\/cloud-server\/"},{"@type":"ListItem","position":3,"name":"Critical Remote Code Execution (RCE) vulnerability in Windows DNS server: how Sherweb\u2019s NOC Services keep you safe"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":[],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/21517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=21517"}],"version-history":[{"count":7,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/21517\/revisions"}],"predecessor-version":[{"id":22315,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/21517\/revisions\/22315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/21521"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=21517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=21517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=21517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}