{"id":8182,"date":"2024-07-02T00:10:54","date_gmt":"2024-07-01T21:10:54","guid":{"rendered":"https:\/\/sunucucozumleri.com\/?p=8182"},"modified":"2024-07-02T00:11:44","modified_gmt":"2024-07-01T21:11:44","slug":"openssh-sunucusunda-uzaktan-kimlik-dogrulamasi-olmayan-kod-yurutme-guvenlik-acigi","status":"publish","type":"post","link":"https:\/\/sunucucozumleri.com\/blog\/openssh-sunucusunda-uzaktan-kimlik-dogrulamasi-olmayan-kod-yurutme-guvenlik-acigi\/","title":{"rendered":"regreSSHion &#8211; OpenSSH sunucusunda Uzaktan Kimlik Do\u011frulamas\u0131 Olmayan Kod Y\u00fcr\u00fctme G\u00fcvenlik A\u00e7\u0131\u011f\u0131"},"content":{"rendered":"<p><strong>regreSSHion<\/strong> Threat Research Unit (TRU), glibc tabanl\u0131 Linux sistemlerindeki <a href=\"https:\/\/sunucucozumleri.com\/blog\/openssh-nedir\/\">OpenSSH<\/a> sunucusunda (sshd) Uzaktan\u00a0<strong>Kimlik Do\u011frulamas\u0131 Olmayan<\/strong>\u00a0Kod Y\u00fcr\u00fctme (RCE) g\u00fcvenlik a\u00e7\u0131\u011f\u0131 \u00a0ke\u015ffetti . Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131na atanan CVE\u00a0<strong>, CVE-2024-6387&#8217;dir.<\/strong><\/p>\n<p>OpenSSH sunucusunda (sshd) bir sinyal i\u015fleyici yar\u0131\u015f durumu olan g\u00fcvenlik a\u00e7\u0131\u011f\u0131, glibc tabanl\u0131 Linux sistemlerinde k\u00f6k olarak kimli\u011fi do\u011frulanmam\u0131\u015f uzaktan kod y\u00fcr\u00fct\u00fclmesine (RCE) izin verir; bu da \u00f6nemli bir g\u00fcvenlik riski olu\u015fturur. Bu yar\u0131\u015f durumu, sshd&#8217;yi varsay\u0131lan yap\u0131land\u0131rmas\u0131nda etkiler.<\/p>\n<p>Censys ve Shodan&#8217;\u0131 kullanarak yapt\u0131\u011f\u0131m\u0131z aramalara dayanarak, \u0130nternet&#8217;e maruz kalan 14 milyondan fazla potansiyel olarak savunmas\u0131z OpenSSH <a href=\"https:\/\/sunucucozumleri.com\/blog\/frontpage\/\">sunucu<\/a> \u00f6rne\u011fi tespit ettik. CSAM 3.0&#8217;dan gelen anonimle\u015ftirilmi\u015f veriler, Harici Sald\u0131r\u0131 Y\u00fczeyi Y\u00f6netimi verileriyle yakla\u015f\u0131k 700.000 harici internete bakan \u00f6rne\u011fin savunmas\u0131z oldu\u011funu ortaya koyuyor. Bu, k\u00fcresel m\u00fc\u015fteri taban\u0131m\u0131zdaki OpenSSH&#8217;li t\u00fcm internete bakan \u00f6rneklerin %31&#8217;ini olu\u015fturuyor. \u0130lgin\u00e7 bir \u015fekilde, OpenSSH hizmetine sahip savunmas\u0131z internete bakan \u00f6rneklerin %0,14&#8217;\u00fcnden fazlas\u0131nda OpenSSH&#8217;nin Kullan\u0131m \u00d6mr\u00fc Sonu\/Destek Sonu s\u00fcr\u00fcm\u00fc \u00e7al\u0131\u015f\u0131yor.<\/p>\n<p>G\u00fcvenlik analizimizde, bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n 2006&#8217;da bildirilen ve daha \u00f6nce yamalanm\u0131\u015f CVE-2006-5051 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n bir gerilemesi oldu\u011funu belirledik. Bu ba\u011flamda bir gerileme, bir kez d\u00fczeltilen bir kusurun, genellikle sorunu yanl\u0131\u015fl\u0131kla yeniden ortaya \u00e7\u0131karan de\u011fi\u015fiklikler veya g\u00fcncellemeler nedeniyle sonraki bir yaz\u0131l\u0131m s\u00fcr\u00fcm\u00fcnde yeniden ortaya \u00e7\u0131kmas\u0131 anlam\u0131na gelir. Bu olay, bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n ortama yeniden girmesini \u00f6nlemek i\u00e7in kapsaml\u0131 gerileme testinin kritik rol\u00fcn\u00fc vurgular. Bu gerileme Ekim 2020&#8217;de (OpenSSH 8.5p1) tan\u0131t\u0131ld\u0131.<\/p>\n<p><strong>regreSSHion<\/strong> g\u00fcvenlik a\u00e7\u0131\u011f\u0131 i\u00e7in \u00e7al\u0131\u015fan bir exploit geli\u015ftirdi. A\u00e7\u0131klama s\u00fcrecinin bir par\u00e7as\u0131 olarak, OpenSSH ekibine, anlay\u0131\u015f ve d\u00fczeltme \u00e7abalar\u0131na yard\u0131mc\u0131 olmak i\u00e7in exploiti ba\u015far\u0131yla g\u00f6sterdik. Exploitlerimizi yay\u0131nlam\u0131yoruz, \u00e7\u00fcnk\u00fc yamalar\u0131n uygulanmas\u0131 i\u00e7in zaman tan\u0131mam\u0131z gerekiyor. Ancak, exploit karma\u015f\u0131k olsa da, di\u011fer ba\u011f\u0131ms\u0131z ara\u015ft\u0131rmac\u0131lar\u0131n sonu\u00e7lar\u0131m\u0131z\u0131 tekrarlayabilece\u011fine inan\u0131yoruz.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Makale \u0130\u00e7eri\u011fi<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"\u0130\u00e7indekiler Tablosunu A\u00e7\/Kapat\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sunucucozumleri.com\/blog\/openssh-sunucusunda-uzaktan-kimlik-dogrulamasi-olmayan-kod-yurutme-guvenlik-acigi\/#OpenSSH_Hakkinda_Kurumsal_Iletisim_ve_Altyapinin_Guvenligini_Saglama\" >OpenSSH Hakk\u0131nda: Kurumsal \u0130leti\u015fim ve Altyap\u0131n\u0131n G\u00fcvenli\u011fini Sa\u011flama<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sunucucozumleri.com\/blog\/openssh-sunucusunda-uzaktan-kimlik-dogrulamasi-olmayan-kod-yurutme-guvenlik-acigi\/#Etkilenen_OpenSSH_surumleri\" >Etkilenen OpenSSH s\u00fcr\u00fcmleri:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sunucucozumleri.com\/blog\/openssh-sunucusunda-uzaktan-kimlik-dogrulamasi-olmayan-kod-yurutme-guvenlik-acigi\/#regreSSHionun_Potansiyel_Etkisi\" >regreSSHion&#8217;un Potansiyel Etkisi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sunucucozumleri.com\/blog\/openssh-sunucusunda-uzaktan-kimlik-dogrulamasi-olmayan-kod-yurutme-guvenlik-acigi\/#Riski_Azaltmak_Icin_Hemen_Atilmasi_Gereken_Adimlar\" >Riski Azaltmak \u0130\u00e7in Hemen At\u0131lmas\u0131 Gereken Ad\u0131mlar<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"about-openssh-securing-enterprise-communications-and-infrastructure\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"OpenSSH_Hakkinda_Kurumsal_Iletisim_ve_Altyapinin_Guvenligini_Saglama\"><\/span><strong>OpenSSH Hakk\u0131nda: Kurumsal \u0130leti\u015fim ve Altyap\u0131n\u0131n G\u00fcvenli\u011fini Sa\u011flama<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>OpenSSH (Open Secure Shell), g\u00fcvenli olmayan a\u011flar \u00fczerinden g\u00fcvenli ileti\u015fim i\u00e7in hayati \u00f6nem ta\u015f\u0131yan Secure Shell (SSH) protokol\u00fcne dayal\u0131 bir dizi g\u00fcvenli a\u011f yard\u0131mc\u0131 program\u0131d\u0131r. Gizlili\u011fi ve g\u00fcvenli dosya transferlerini garantilemek i\u00e7in sa\u011flam \u015fifreleme sa\u011flar ve bu da onu uzak <a href=\"https:\/\/sunucucozumleri.com\/blog\/sunucu-yonetimi-icin-en-iyi-araclar-ve-yazilimlar\/\">sunucu y\u00f6netimi<\/a> ve g\u00fcvenli veri ileti\u015fimi i\u00e7in olmazsa olmaz bir ara\u00e7 haline getirir. Kapsaml\u0131 g\u00fcvenlik ve kimlik do\u011frulama \u00f6zellikleriyle bilinen OpenSSH, \u00e7e\u015fitli \u015fifreleme teknolojilerini destekler ve macOS ve Linux dahil olmak \u00fczere birden fazla Unix benzeri sistemde standartt\u0131r.<\/p>\n<p>OpenSSH&#8217;nin uygulamas\u0131, g\u00fcvenli ileti\u015fim i\u00e7in kritik bir ara\u00e7 g\u00f6revi g\u00f6r\u00fcr. Kurumsal de\u011feri, \u00f6l\u00e7eklenebilirli\u011finde ve \u00e7e\u015fitli ortamlarda sa\u011flam eri\u015fim kontrolleri ve g\u00fcvenli otomatik s\u00fcre\u00e7ler uygulama yetene\u011finde yatar. Bu, otomatik yedeklemelerden ve toplu i\u015flemelerden, hassas verilerin birden fazla sistem ve konumda g\u00fcvenli bir \u015fekilde i\u015flenmesini i\u00e7eren karma\u015f\u0131k DevOps uygulamalar\u0131na kadar her \u015feyi i\u00e7erir. S\u00fcrekli geli\u015fimi ve yayg\u0131n benimsenmesi, d\u00fcnya \u00e7ap\u0131nda a\u011f ileti\u015fimlerinin gizlili\u011fini ve b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fc korumadaki \u00f6nemini vurgular.<\/p>\n<p>OpenSSH, yaz\u0131l\u0131m g\u00fcvenli\u011finde bir \u00f6l\u00e7\u00fct olarak durmaktad\u0131r ve sa\u011flam bir derinlemesine savunma yakla\u015f\u0131m\u0131na \u00f6rnek te\u015fkil etmektedir. Son zafiyete ra\u011fmen, genel sicili ola\u011fan\u00fcst\u00fc derecede g\u00fc\u00e7l\u00fc kalmaya devam etmektedir ve bu alanda hem bir model hem de bir ilham kayna\u011f\u0131 olarak hizmet etmektedir.<\/p>\n<h2 id=\"affected-openssh-versions\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Etkilenen_OpenSSH_surumleri\"><\/span><strong>Etkilenen OpenSSH s\u00fcr\u00fcmleri:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>4.4p1&#8217;den \u00f6nceki OpenSSH s\u00fcr\u00fcmleri, CVE-2006-5051 ve CVE-2008-4109 yamalar\u0131 uygulanmad\u0131\u011f\u0131 takdirde bu sinyal i\u015fleyici yar\u0131\u015f durumuna kar\u015f\u0131 savunmas\u0131zd\u0131r.<\/li>\n<\/ul>\n<ul>\n<li>4.4p1&#8217;den 8.5p1&#8217;e kadar olan s\u00fcr\u00fcmler (bu s\u00fcr\u00fcm dahil de\u011fildir), daha \u00f6nce g\u00fcvenli olmayan bir i\u015flevi g\u00fcvenli hale getiren CVE-2006-5051 i\u00e7in d\u00f6n\u00fc\u015ft\u00fcr\u00fcc\u00fc bir yama nedeniyle g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan muaft\u0131r.<\/li>\n<\/ul>\n<ul>\n<li>G\u00fcvenlik a\u00e7\u0131\u011f\u0131, bir fonksiyondaki kritik bir bile\u015fenin yanl\u0131\u015fl\u0131kla kald\u0131r\u0131lmas\u0131 nedeniyle 8.5p1&#8217;den 9.8p1&#8217;e kadar olan s\u00fcr\u00fcmlerde tekrar ortaya \u00e7\u0131k\u0131yor.<\/li>\n<\/ul>\n<p>OpenBSD sistemleri bu hatadan etkilenmez, \u00e7\u00fcnk\u00fc OpenBSD 2001 y\u0131l\u0131nda bu a\u00e7\u0131\u011f\u0131 engelleyen g\u00fcvenli bir mekanizma geli\u015ftirmi\u015ftir.<\/p>\n<h2 id=\"potential-impact-of-regresshion\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"regreSSHionun_Potansiyel_Etkisi\"><\/span><strong>regreSSHion&#8217;un Potansiyel Etkisi<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, istismar edilirse, bir sald\u0131rgan\u0131n en y\u00fcksek ayr\u0131cal\u0131klara sahip keyfi kod \u00e7al\u0131\u015ft\u0131rabilece\u011fi ve bunun sonucunda sistemin tamam\u0131n\u0131n ele ge\u00e7irilmesi, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fcklenmesi, veri manip\u00fclasyonu ve kal\u0131c\u0131 eri\u015fim i\u00e7in arka kap\u0131lar olu\u015fturulmas\u0131yla sonu\u00e7lanabilecek tam sistem ihlaline yol a\u00e7abilir. A\u011f yay\u0131l\u0131m\u0131n\u0131 kolayla\u015ft\u0131rabilir ve sald\u0131rganlar\u0131n, kurulu\u015f i\u00e7indeki di\u011fer g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan sistemleri ge\u00e7mek ve istismar etmek i\u00e7in tehlikeye at\u0131lm\u0131\u015f bir sistemi bir dayanak noktas\u0131 olarak kullanmalar\u0131na olanak tan\u0131yabilir.<\/p>\n<p>Ayr\u0131ca, k\u00f6k eri\u015fimi elde etmek sald\u0131rganlar\u0131n g\u00fcvenlik duvarlar\u0131, sald\u0131r\u0131 tespit sistemleri ve g\u00fcnl\u00fckleme mekanizmalar\u0131 gibi kritik g\u00fcvenlik mekanizmalar\u0131n\u0131 atlatmas\u0131n\u0131 sa\u011flayarak faaliyetlerini daha da belirsizle\u015ftirir. Bu ayr\u0131ca \u00f6nemli veri ihlallerine ve s\u0131z\u0131nt\u0131lar\u0131na yol a\u00e7abilir ve sald\u0131rganlara sistemde depolanan t\u00fcm verilere, \u00e7al\u0131nabilecek veya kamuya a\u00e7\u0131klanabilecek hassas veya \u00f6zel bilgiler dahil olmak \u00fczere eri\u015fim sa\u011flayabilir.<\/p>\n<p>Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, ba\u015far\u0131l\u0131 bir sald\u0131r\u0131 i\u00e7in birden fazla giri\u015fim gerektiren uzaktan yar\u0131\u015f ko\u015fulu do\u011fas\u0131 nedeniyle istismar edilmesi zordur. Bu, bellek bozulmas\u0131na neden olabilir ve Adres Alan\u0131 D\u00fczeni Rastgelele\u015ftirmesinin (ASLR) \u00fcstesinden gelinmesini gerektirebilir. Derin \u00f6\u011frenmedeki geli\u015fmeler, istismar oran\u0131n\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131rabilir ve sald\u0131rganlara bu t\u00fcr g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanmada \u00f6nemli bir avantaj sa\u011flayabilir.<\/p>\n<h2 id=\"immediate-steps-to-mitigate-risk\" class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Riski_Azaltmak_Icin_Hemen_Atilmasi_Gereken_Adimlar\"><\/span><strong>Riski Azaltmak \u0130\u00e7in Hemen At\u0131lmas\u0131 Gereken Ad\u0131mlar<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Linux sistemlerinde uzaktan kod y\u00fcr\u00fctmeyi sa\u011flayan OpenSSH&#8217;deki regreSSHion a\u00e7\u0131\u011f\u0131n\u0131 ele almak, odaklanm\u0131\u015f ve katmanl\u0131 bir g\u00fcvenlik yakla\u015f\u0131m\u0131 gerektirir. \u0130\u015fte i\u015fletmelerin bu \u00f6nemli tehdide kar\u015f\u0131 korunmalar\u0131 i\u00e7in \u00f6zl\u00fc ad\u0131mlar ve stratejik \u00f6neriler:<\/p>\n<ol start=\"1\">\n<li><strong>Yama Y\u00f6netimi<\/strong>\u00a0: OpenSSH i\u00e7in mevcut yamalar\u0131 h\u0131zla uygulay\u0131n ve devam eden g\u00fcncelleme s\u00fcre\u00e7lerine \u00f6ncelik verin.<\/li>\n<li><strong>Geli\u015fmi\u015f Eri\u015fim Kontrol\u00fc<\/strong>\u00a0: Sald\u0131r\u0131 risklerini en aza indirmek i\u00e7in a\u011f tabanl\u0131 kontroller arac\u0131l\u0131\u011f\u0131yla SSH eri\u015fimini s\u0131n\u0131rlay\u0131n.<\/li>\n<li><strong>A\u011f Segmentasyonu ve Sald\u0131r\u0131 Alg\u0131lama<\/strong>\u00a0: Kritik ortamlarda yetkisiz eri\u015fimi ve yan hareketleri k\u0131s\u0131tlamak i\u00e7in a\u011flar\u0131 b\u00f6l\u00fcn ve istismar giri\u015fimlerini g\u00f6steren ola\u011fand\u0131\u015f\u0131 faaliyetleri izleyen ve uyaran sistemler konu\u015fland\u0131r\u0131n.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>regreSSHion Threat Research Unit (TRU), glibc tabanl\u0131 Linux sistemlerindeki OpenSSH sunucusunda (sshd) Uzaktan\u00a0Kimlik Do\u011frulamas\u0131 Olmayan\u00a0Kod Y\u00fcr\u00fctme (RCE) g\u00fcvenlik a\u00e7\u0131\u011f\u0131 \u00a0ke\u015ffetti . Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131na atanan CVE\u00a0, CVE-2024-6387&#8217;dir. OpenSSH sunucusunda (sshd) bir sinyal i\u015fleyici yar\u0131\u015f durumu olan g\u00fcvenlik a\u00e7\u0131\u011f\u0131, glibc tabanl\u0131 Linux sistemlerinde k\u00f6k olarak kimli\u011fi do\u011frulanmam\u0131\u015f uzaktan kod y\u00fcr\u00fct\u00fclmesine (RCE) izin verir; bu da \u00f6nemli &hellip;<\/p>\n","protected":false},"author":1,"featured_media":8183,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-8182","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux"],"acf":[],"_links":{"self":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts\/8182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/comments?post=8182"}],"version-history":[{"count":0,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts\/8182\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/media\/8183"}],"wp:attachment":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/media?parent=8182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/categories?post=8182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/tags?post=8182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}