{"id":2938,"date":"2018-11-08T13:41:06","date_gmt":"2018-11-08T13:41:06","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2018\/11\/08\/cve-2018-18863-resourcelink-local-file-inclusion\/"},"modified":"2024-03-18T16:08:05","modified_gmt":"2024-03-18T16:08:05","slug":"cve-2018-18863-resourcelink-local-file-inclusion","status":"publish","type":"post","link":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/","title":{"rendered":"CVE-2018-18863 ResourceLink Local File Inclusion"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2938\" class=\"elementor elementor-2938\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d7314c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d7314c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3bbeae69\" data-id=\"3bbeae69\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ac5141a elementor-widget elementor-widget-text-editor\" data-id=\"ac5141a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a recent penetration test ResourceLink version 20.0.2.1 was found to be vulnerable to local file inclusion (LFI). ResourceLink is a payroll web application that allows HR departments to manage payments and employees&#8217; bank account details.<\/p><p>LFI allows an attacker to include the contents of another file hosted on the web server, within a web page. Only files to which the web service has read access can be included.<\/p><p>The vulnerability exists in the &#8220;logfiledownload&#8221; parameter which is part of the ResourceLink support section included within the ResourceLink application. The support section was accessible with default and weak credentials (support\/support). The vulnerable parameter allows an authenticated user to view logs of the web application. However, an attacker can abuse this functionality to read files on the server, such as &#8220;C:\\Windows\\win.ini&#8221;, as shown below.<\/p><p><a href=\"https:\/\/[redacted]\/support\/logfiledownload?file=..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\Windows\\win.ini&amp;download=false\">https:\/\/[redacted]\/support\/logfiledownload?file=<strong>..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\Windows\\win.ini<\/strong>&amp;download=false<\/a><br \/><img decoding=\"async\" style=\"height: 95px; width: 556px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/resourcelink_01.png\" alt=\"\" \/><\/p><p>An attacker can exploit this vulnerability to read files containing sensitive information stored on the server, such as clear text credentials or session cookies. The following example shows it was possible to retrieve JSESSIONIDs, URL session IDs, and clear-text passwords from a log file:<\/p><p><a href=\"https:\/\/[redacted]\/support\/logfiledownload?file=..\\..\\logs\\server.log&amp;download=false\">https:\/\/[redacted]\/support\/logfiledownload?file=<strong>..\\..\\logs\\server.log<\/strong>&amp;download=false<\/a><br \/><img decoding=\"async\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/resourcelink_02.png\" alt=\"\" \/><\/p><p>Furthermore, an attacker can abuse this vulnerability to read the SQL connection string, which contains the credentials that ResourceLink web application uses to connect to the Oracle database:<\/p><p><a href=\"https:\/\/[redacted]\/support\/logfiledownload?file=..\\..\\config\\domain.xml&amp;download=false\">https:\/\/[redacted]\/support\/logfiledownload?file=<strong>..\\..\\config\\domain.xml<\/strong>&amp;download=false<\/a><br \/><img decoding=\"async\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/resourcelink_03.png\" alt=\"\" \/><\/p><p>As result, this would allow an attacker to access data stored in the Oracle database such as bank account details:<\/p><p><img decoding=\"async\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/resourcelink_04.png\" alt=\"\" \/><\/p><h3>Vulnerability Disclosure Timeline<\/h3><p>08\/08\/2018: Initial contact to the vendor using the contact form on the vendor&#8217;s website.<br \/>08\/08\/2018: Software developer director contact details were found on vendor&#8217; website and was contacted directly.<br \/>03\/09\/2018: No response was received and a last call email was sent to the vendor.<br \/>11\/09\/2018: The vendor replied asking for further details.<br \/>21\/09\/2018: Established a telephone call with the vendor who confirmed the vulnerability.<br \/>30\/10\/2018: The vendor confirmed that vulnerability is now fixed in release 20.<br \/>08\/11\/2018: CVE-2018-18863 vulnerability was disclosed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In a recent penetration test ResourceLink version 20.0.2.1 was found to be vulnerable to local file inclusion (LFI). ResourceLink is a payroll web application that allows HR departments to manage payments and employees&#8217; bank account details. LFI allows an attacker to include the contents of another file hosted on the web server, within a web [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8902,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[215],"class_list":["post-2938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","tag-vulnerabilities","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CVE-2018-18863 ResourceLink Local File Inclusion<\/title>\n<meta name=\"description\" content=\"In a recent penetration test ResourceLink version 20.0.2.1 was found to be vulnerable to local file inclusion (LFI). ResourceLink is a payroll web\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2018-18863 ResourceLink Local File Inclusion\" \/>\n<meta property=\"og:description\" content=\"In a recent penetration test ResourceLink version 20.0.2.1 was found to be vulnerable to local file inclusion (LFI). ResourceLink is a payroll web\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-08T13:41:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-18T16:08:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/11\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"CVE-2018-18863 ResourceLink Local File Inclusion\",\"datePublished\":\"2018-11-08T13:41:06+00:00\",\"dateModified\":\"2024-03-18T16:08:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/\"},\"wordCount\":341,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1\",\"keywords\":[\"vulnerabilities\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/\",\"name\":\"CVE-2018-18863 ResourceLink Local File Inclusion\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1\",\"datePublished\":\"2018-11-08T13:41:06+00:00\",\"dateModified\":\"2024-03-18T16:08:05+00:00\",\"description\":\"In a recent penetration test ResourceLink version 20.0.2.1 was found to be vulnerable to local file inclusion (LFI). ResourceLink is a payroll web\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/cve-2018-18863-resourcelink-local-file-inclusion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2018-18863 ResourceLink Local File Inclusion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/en-us\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2018-18863 ResourceLink Local File Inclusion","description":"In a recent penetration test ResourceLink version 20.0.2.1 was found to be vulnerable to local file inclusion (LFI). ResourceLink is a payroll web","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/","og_locale":"en_US","og_type":"article","og_title":"CVE-2018-18863 ResourceLink Local File Inclusion","og_description":"In a recent penetration test ResourceLink version 20.0.2.1 was found to be vulnerable to local file inclusion (LFI). ResourceLink is a payroll web","og_url":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2018-11-08T13:41:06+00:00","article_modified_time":"2024-03-18T16:08:05+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/11\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1","type":"image\/png"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Written by":"Dionach Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"CVE-2018-18863 ResourceLink Local File Inclusion","datePublished":"2018-11-08T13:41:06+00:00","dateModified":"2024-03-18T16:08:05+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/"},"wordCount":341,"publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"image":{"@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/11\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1","keywords":["vulnerabilities"],"articleSection":["researchblog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/","url":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/","name":"CVE-2018-18863 ResourceLink Local File Inclusion","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/11\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1","datePublished":"2018-11-08T13:41:06+00:00","dateModified":"2024-03-18T16:08:05+00:00","description":"In a recent penetration test ResourceLink version 20.0.2.1 was found to be vulnerable to local file inclusion (LFI). ResourceLink is a payroll web","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/11\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/11\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/cve-2018-18863-resourcelink-local-file-inclusion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"CVE-2018-18863 ResourceLink Local File Inclusion"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/11\/File-Inclusion-Vulnerabilities.png?fit=1200%2C630&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Lo","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=2938"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2938\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media\/8902"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=2938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/categories?post=2938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/tags?post=2938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}