{"id":185,"date":"2016-07-12T15:59:52","date_gmt":"2016-07-12T15:59:52","guid":{"rendered":"http:\/\/www.urolime.com\/blogs\/in\/?p=185"},"modified":"2021-09-21T12:59:25","modified_gmt":"2021-09-21T07:29:25","slug":"wget-cve-arbitrary-file-upload","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/","title":{"rendered":"Wget CVE-2016-4971: Arbitrary File Upload"},"content":{"rendered":"<p><strong>CVE-2016-4971 [Arbitrary File Upload \/ Potential Remote Code Execution]<\/strong><\/p>\n<p>Severity: High below 1.8 version.<\/p>\n<p>All versions of Wget before the patched version of 1.18 are affected.<\/p>\n<p>1. GNU wget before 1.18 when supplied with a malicious URL (to a malicious or compromised web server) can be tricked into saving an arbitrary remote file supplied by an attacker, with arbitrary contents and file name under the current directory and possibly other directories by writing to .wgetrc.<br \/>\n2. Remote code execution and even root privilege escalation if wget is run via a root cronjob as is often the case in many web application deployments.<br \/>\n3. Can exploit intercept\/modify the network traffic.<\/p>\n<p>Due to lack of control in the utility (wget) , downloading a link from a remote server which is controled by an attacker create an arbitrary file<br \/>\nwith an arbitrary contents and filename by issuing a crafted HTTP 30X Redirect containing FTP server reference in response to the victim&#8217;s wget request.<\/p>\n<blockquote><p>ubuntusyn:~\/test\/blog$ wget &#8211;version | head -n1<br \/>\nGNU Wget 1.15 built on linux-gnu.<\/p><\/blockquote>\n<p><strong>Solution:<\/strong><br \/>\nUpdate wget to version 1.18<\/p>\n<blockquote><p>Patch lists::<\/p>\n<p>Ubuntu ::<\/p>\n<p>Ubuntu 12.04 LTS (Precise Pangolin) = released (1.13.4-2ubuntu1.4)<br \/>\nUbuntu 14.04 LTS (Trusty Tahr) = released (1.15-1ubuntu1.14.04.2)<br \/>\nUbuntu Touch 15.04 = needed<br \/>\nUbuntu Core 15.04 = does not exist<br \/>\nUbuntu 15.10 (Wily Werewolf) = released (1.16.1-1ubuntu1.1)<br \/>\nUbuntu 16.04 LTS (Xenial Xerus) = released (1.17.1-1ubuntu1.1)<br \/>\nUbuntu 16.10 (Yakkety Yak) = released (1.17.1-1ubuntu2)<\/p>\n<p>RedHat::<\/p>\n<p>Red Hat Enterprise Linux 6 = Will not fix<br \/>\nRed Hat Enterprise Linux 7 = Fix deferred<br \/>\nRed Hat Enterprise Linux 5 = Will not fix<\/p><\/blockquote>\n<p>Ubuntu::<br \/>\nThe latest wget version is not available in any PPA or repository to install Wget version 1.18.<\/p>\n<p>Below installation steps will guide you the manual installation process of GNU Wget.<\/p>\n<blockquote><p>root@ubuntusyn:\/usr\/local\/src# apt-get update<br \/>\nroot@ubuntusyn:\/usr\/local\/src# apt-get build-dep wget<\/p>\n<p>root@ubuntusyn:\/usr\/local\/src# wget http:\/\/ftp.gnu.org\/gnu\/wget\/wget-1.18.tar.gz<\/p>\n<p>root@ubuntusyn:\/usr\/local\/src# tar -xvf wget-1.18.tar.gz<br \/>\nroot@ubuntusyn:\/usr\/local\/src# cd wget-1.18<br \/>\nroot@ubuntusyn:\/usr\/local\/src\/wget-1.18# .\/configure &#8211;with-ssl=openssl &#8211;prefix=\/opt\/wget<br \/>\nroot@ubuntusyn:\/usr\/local\/src\/wget-1.18# make<br \/>\nroot@ubuntusyn:\/usr\/local\/src\/wget-1.18# make install<\/p>\n<p>root@ubuntusyn:\/usr\/local\/src\/wget-1.18# \/opt\/wget\/bin\/wget -V | head -n1<br \/>\nGNU Wget 1.18 built on linux-gnu.<\/p>\n<p>root@ubuntusyn:\/usr\/bin# mv wget wget_v1.15<br \/>\nroot@ubuntusyn:\/usr\/bin# ln -s \/opt\/wget\/bin\/wget \/usr\/bin\/wget<br \/>\nroot@ubuntusyn:\/usr\/bin# wget -V | head -n1<br \/>\nGNU Wget 1.18 built on linux-gnu.<\/p><\/blockquote>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_185\" class=\"pvc_stats all  \" data-element-id=\"185\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2016-4971 [Arbitrary File Upload \/ Potential Remote Code Execution] Severity: High below 1.8 version. All versions of Wget before the patched version of 1.18 are affected. 1. GNU wget before 1.18 when supplied with a malicious URL (to a malicious or compromised web server) can be tricked into saving an arbitrary remote file supplied by [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_185\" class=\"pvc_stats all  \" data-element-id=\"185\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-185","post","type-post","status-publish","format-standard","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Wget CVE-2016-4971: Arbitrary File Upload<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wget CVE-2016-4971: Arbitrary File Upload\" \/>\n<meta property=\"og:description\" content=\"CVE-2016-4971 [Arbitrary File Upload \/ Potential Remote Code Execution] Severity: High below 1.8 version. All versions of Wget before the patched version of 1.18 are affected. 1. GNU wget before 1.18 when supplied with a malicious URL (to a malicious or compromised web server) can be tricked into saving an arbitrary remote file supplied by \u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-12T15:59:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-21T07:29:25+00:00\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"Wget CVE-2016-4971: Arbitrary File Upload\",\"datePublished\":\"2016-07-12T15:59:52+00:00\",\"dateModified\":\"2021-09-21T07:29:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/\"},\"wordCount\":398,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/\",\"name\":\"Wget CVE-2016-4971: Arbitrary File Upload\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\"},\"datePublished\":\"2016-07-12T15:59:52+00:00\",\"dateModified\":\"2021-09-21T07:29:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.urolime.com\/blogs\/in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wget CVE-2016-4971: Arbitrary File Upload\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wget CVE-2016-4971: Arbitrary File Upload","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/","og_locale":"en_US","og_type":"article","og_title":"Wget CVE-2016-4971: Arbitrary File Upload","og_description":"CVE-2016-4971 [Arbitrary File Upload \/ Potential Remote Code Execution] Severity: High below 1.8 version. All versions of Wget before the patched version of 1.18 are affected. 1. GNU wget before 1.18 when supplied with a malicious URL (to a malicious or compromised web server) can be tricked into saving an arbitrary remote file supplied by \u2026","og_url":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/","og_site_name":"Urolime Blogs","article_published_time":"2016-07-12T15:59:52+00:00","article_modified_time":"2021-09-21T07:29:25+00:00","author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"Wget CVE-2016-4971: Arbitrary File Upload","datePublished":"2016-07-12T15:59:52+00:00","dateModified":"2021-09-21T07:29:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/"},"wordCount":398,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/","url":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/","name":"Wget CVE-2016-4971: Arbitrary File Upload","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#website"},"datePublished":"2016-07-12T15:59:52+00:00","dateModified":"2021-09-21T07:29:25+00:00","breadcrumb":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.urolime.com\/blogs\/in\/wget-cve-arbitrary-file-upload\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.urolime.com\/blogs\/in\/"},{"@type":"ListItem","position":2,"name":"Wget CVE-2016-4971: Arbitrary File Upload"}]},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/in\/#website","url":"https:\/\/www.urolime.com\/blogs\/in\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/in\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":5,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/185\/revisions"}],"predecessor-version":[{"id":2444,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/185\/revisions\/2444"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/media?parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/categories?post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/tags?post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}