{"id":6638,"date":"2025-12-04T19:42:04","date_gmt":"2025-12-04T15:42:04","guid":{"rendered":"https:\/\/jsnet.biz\/?p=6638"},"modified":"2025-12-04T19:42:06","modified_gmt":"2025-12-04T15:42:06","slug":"%d0%bc%d0%be%d0%b4-%d0%b1%d0%b5%d0%b7%d0%be%d0%bf%d0%b0%d1%81%d0%bd%d0%be%d1%81%d1%82%d0%b8-veb-t%c9%99hluk%c9%99sizliyind%c9%99-guclu-mudafi%c9%99ci","status":"publish","type":"post","link":"https:\/\/jsnet.biz\/ru\/%d0%bc%d0%be%d0%b4-%d0%b1%d0%b5%d0%b7%d0%be%d0%bf%d0%b0%d1%81%d0%bd%d0%be%d1%81%d1%82%d0%b8-veb-t%c9%99hluk%c9%99sizliyind%c9%99-guclu-mudafi%c9%99ci\/","title":{"rendered":"\u041c\u043e\u0434 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438: Veb T\u0259hl\u00fck\u0259sizliyind\u0259 G\u00fccl\u00fc M\u00fcdafi\u0259\u00e7i"},"content":{"rendered":"<article>\n<h2>\u041c\u043e\u0434 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438: Veb T\u0259hl\u00fck\u0259sizliyind\u0259 G\u00fccl\u00fc M\u00fcdafi\u0259\u00e7i<\/h2>\n<p>\u0412 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u0435\u0441\u0442\u044c \u044d\u043a\u043e\u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u044b \u0438 \u043e\u043d\u043b\u0430\u0439\u043d-\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b. \u041d\u043e t\u0259hl\u00fck\u0259l\u0259rd\u0259n qorunmaq \u00fc\u00e7\u00fcn g\u00fccl\u00fc m\u00fcdafi\u0259 mexanizml\u0259ri z\u0259rur\u0259t\u0259 \u00e7evrilib. <strong>\u041c\u043e\u0434 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438<\/strong> bu sah\u0259d\u0259 veb t\u0259hl\u00fck\u0259sizliyind\u0259 yeni d\u00f6vr\u00fcn qalxan\u0131 kimi \u00e7\u0131x\u0131\u015f edir. \u041d\u043e m\u0259qal\u0259d\u0259 Mod Security-nin \u0438 oldu\u011fu v\u0259 onun h\u00fccumlara qar\u015f\u0131 nec\u0259 geni\u015fmiqyasl\u0131 m\u00fcdafi\u0259 t\u0259min etdiyi \u0259trafl\u0131 \u015f\u0259kild\u0259 analiz edil\u0259c\u0259k.<\/p>\n<h3>\u041c\u043e\u0434 Security N\u0259dir? Veb T\u0259hl\u00fck\u0259sizliyind\u0259 Yeni D\u00f6vr\u00fcn Qalxan\u0131<\/h3>\n<p><strong>\u041c\u043e\u0434 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438<\/strong>, \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043a\u043e\u0434\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043c\u043e\u0434\u0443\u043b\u044f olaraq tan\u0131n\u0131r. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 HTTP-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 Apache \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c Nginx \u0438 IIS, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u0435\u0440\u0432\u0435\u0440 IIS \u0438 \u0438\u0441\u0442\u0438\u0444\u0430\u0434 \u0438 \u0442.\u0434. Mod Security, \u043f\u0440\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0442\u0440\u0430\u0444\u0438\u043a \u0442\u0440\u0430\u0444\u0438\u043a\u0430 \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f, \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0437\u043c\u0435\u043d\u0435\u043d \u0438\u043b\u0438 \u0438\u0437\u043c\u0435\u043d\u0435\u043d.<\/p>\n<p>\u0415\u0441\u043b\u0438 \u043c\u043e\u0434\u0443\u043b\u044c \u0259n \u00f6n\u0259mli x\u00fcsusiyy\u0259tl\u0259rind\u0259n biri, \u0430\u043d\u0430\u043b\u0438\u0437 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438 (Reall\u0131 vaxt) v\u0259 t\u0259nziml\u0259m\u0259 imkan\u0131d\u0131r. \u041e\u0434\u043d\u0430\u043a\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u044b \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0442\u0440\u0430\u0444\u0438\u043a, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u044b, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432 \u0446\u0435\u043b\u044f\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0442.\u0434. \u041d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u043c\u043e\u0434\u0443\u043b\u044c\u043d\u044b\u0439 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0438\u0439 \u0432 \u0441\u0435\u0431\u044f \u0432\u0441\u0435 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f, SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u044e \u0438 \u043c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u044b\u0439 \u0441\u043a\u0440\u0438\u043f\u0442\u0438\u043d\u0433, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440.<\/p>\n<p>Mod Security-nin geni\u015f istifad\u0259 olunmas\u0131n\u0131n ba\u015fqa bir s\u0259b\u0259bi onun \u00e7evik qayda bazas\u0131na malik olmas\u0131d\u0131r. \u0130stifad\u0259\u00e7il\u0259r \u00f6z t\u0259l\u0259bl\u0259rin\u0259 uy\u011fun qaydalar yarada v\u0259 m\u00f6vcud qaydalar d\u0259stini t\u0259kmill\u0259\u015fdir\u0259 bil\u0259rl\u0259r. \u041d\u043e \u043e\u043d\u0443 f\u0259rdil\u0259\u015fmi\u015f v\u0259hat\u0259li bir t\u0259hl\u00fck\u0259sizlik h\u0259llin\u0259 \u00e7evirir.<\/p>\n<h3>Mod Security il\u0259 H\u00fccumlara Qar\u015f\u0131 Geni\u015fmiqyasl\u0131 M\u00fcdafi\u0259nin Sirl\u0259ri<\/h3>\n<p>Mod Security-nin g\u00fcc\u00fc onun \u00e7oxsah\u0259li m\u00fcdafi\u0259 strategiyas\u0131nda gizlidir. \u041e, h\u0259m anomaliyalar\u0131n\u0131 m\u00fc\u0259yy\u0259n edir, h\u0259m d\u0259 imza \u0259sasl\u0131 h\u00fccum t\u0259hl\u00fck\u0259l\u0259rini qar\u015f\u0131s\u0131n\u0131 al\u0131r. \u041d\u043e \u044f\u043d\u0430\u0448\u043c\u0430 \u0438\u043b\u0438 \u043c\u043e\u0434\u0443\u043b\u044c m\u00fcxt\u0259lif h\u00fccum n\u00f6vl\u0259rin\u0259 qar\u015f\u0131 geni\u015fmiqyasl\u0131 qorunma t\u0259min edir.<\/p>\n<p>Mod Security, istifad\u0259y\u0259 verilmi\u015f qaydalar d\u0259sti il\u0259 a\u015fa\u011f\u0131dak\u0131 kimi t\u0259hl\u00fck\u0259l\u0259ri a\u015fkarlay\u0131b qar\u015f\u0131s\u0131n\u0131 ala bilir:<\/p>\n<ul>\n<li><strong>SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u044f:<\/strong> Veril\u0259nl\u0259r bazas\u0131na z\u0259r\u0259rli sor\u011fular\u0131n daxil olmas\u0131<\/li>\n<li><strong>XSS H\u00fccumlar\u0131:<\/strong> Scriptl\u0259rinsayt i\u00e7\u0259risind\u0259 icra olunmas\u0131<\/li>\n<li><strong>\u0412\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 (LFI):<\/strong> Yerli filelar\u0131n icaz\u0259siz \u00e7a\u011fr\u0131lmas\u0131<\/li>\n<li><strong>HTTP T\u0259hl\u00fck\u0259l\u0259ri:<\/strong> S\u0259hv \u0438 z\u0259r\u0259rli HTTP-\u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f<\/li>\n<\/ul>\n<table class=\"wp-list-table widefat fixed striped\">\n<thead>\n<tr>\n<th>H\u00fccum N\u00f6v\u00fc<\/th>\n<th>\u041c\u043e\u0434 Security \u018fsas M\u00fcdafi\u0259 Mexanizmi<\/th>\n<th>\u0420\u0438\u0441\u043a N\u0259tic\u0259si<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u044f<\/td>\n<td>\u015e\u00fcbh\u0259li sor\u011fular\u0131n bloklanmas\u0131<\/td>\n<td>M\u0259lumat s\u0131zmas\u0131, sistem\u0259 giri\u015f<\/td>\n<\/tr>\n<tr>\n<td>XSS<\/td>\n<td>\u0421\u043a\u0440\u0438\u043f\u0442 t\u0259mizl\u0259m\u0259 v\u0259 bloklama<\/td>\n<td>\u0130stifad\u0259\u00e7i m\u0259lumatlar\u0131n\u0131n o\u011furlanmas\u0131<\/td>\n<\/tr>\n<tr>\n<td>\u041b\u0424\u0418<\/td>\n<td>\u0424\u0430\u0439\u043b \u00e7a\u011f\u0131r\u0131\u015flar\u0131n\u0131n yoxlan\u0131lmas\u0131<\/td>\n<td>\u0421\u0435\u0440\u0432\u0435\u0440 idar\u0259etm\u0259sinin itm\u0259si<\/td>\n<\/tr>\n<tr>\n<td>HTTP T\u0259hl\u00fck\u0259l\u0259ri<\/td>\n<td>Qeyri-qanuni ist\u0259kl\u0259rin filtrasiyas\u0131<\/td>\n<td>Sayt\u0131n i\u015fl\u0259kliyinin pozulmas\u0131<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u0415\u0441\u043b\u0438 \u043c\u043e\u0434 Security-nin \u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d, \u043e\u043d \u0431\u0443\u0434\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0434\u043b\u044f \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430, \u0438 \u043e\u043d \u0431\u0443\u0434\u0435\u0442 \u043e\u0442\u043a\u0440\u044b\u0442 \u0434\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438. Qura\u015fd\u0131r\u0131lmas\u0131 v\u0259 konfiqurasiyas\u0131 nisb\u0259t\u0259n sad\u0259dir, ancaq n\u0259tic\u0259d\u0259 t\u0259min olunan t\u0259hl\u00fck\u0259sizlik s\u0259viyy\u0259si y\u00fcks\u0259kdir.<\/p>\n<p>Bel\u0259likl\u0259, Mod Security yaln\u0131z bir t\u0259hl\u00fck\u0259sizlik al\u0259ti deyil, h\u0259m d\u0259 veb t\u0259tbiq idar\u0259\u00e7il\u0259rin\u0259 h\u00fccumlar \u00f6nc\u0259si v\u0259 zaman\u0131 g\u00fccl\u00fc x\u0259b\u0259rdarl\u0131q v\u0259 qorunma t\u0259qdim ed\u0259n dinamik \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433. \u041d\u043e, \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u044d\u0442\u0438 \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0431\u0443\u0434\u0443\u0442 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u044b.<\/p>\n<h3>N\u0259tic\u0259<\/h3>\n<p>\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u0440\u0438\u0441\u043a\u0435, Mod Security kimi m\u00fcasir v\u0259 \u00e7evik t\u0259hl\u00fck\u0259sizlik h\u0259ll\u0259ri vacibdir. \u041d\u043e \u043c\u043e\u0434\u0443\u043b\u044c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u043c, \u043c\u043e\u0436\u0435\u0442 \u043e\u043a\u0430\u0437\u0430\u0442\u044c\u0441\u044f \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u043c \u0434\u043b\u044f \u044d\u0442\u0438\u0445 \u0446\u0435\u043b\u0435\u0439. Mod Security, \u0432\u0435\u0431-\u0441\u0430\u0439\u0442, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0443.<\/p>\n<p>\u0415\u0441\u043b\u0438 \u0432\u044b \u0445\u043e\u0442\u0438\u0442\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0443, \u044d\u0442\u043e \u0431\u0443\u0434\u0435\u0442 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043e\u043c. \u041c\u043e\u0434 Security-nin t\u0259tbiqi, \u043d\u043e \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u044b \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043e\u043b\u0436\u043d\u044b \u0431\u044b\u0442\u044c \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0432\u0430\u0441. H\u0259r bir vebsayt\u0131 idar\u0259 ed\u0259n \u015f\u0259xs bu g\u00fccl\u00fc m\u00fcdafi\u0259\u00e7i il\u0259 tan\u0131\u015f olmal\u0131 v\u0259 t\u0259tbiq etm\u0259lidir.<\/p>\n<p>\u0421\u043e\u043d \u041e\u043b\u0430\u0440\u0430\u043a, \u0432\u044d\u0431 t\u0259hl\u00fck\u0259sizliyind\u0259 daima inki\u015faf ed\u0259n h\u00fccum \u00fcsullar\u0131na qar\u015f\u0131 davaml\u0131 olaraq t\u0259nziml\u0259m\u0259 v\u0259 yenil\u0259nm\u0259 prosesi aparmaq vacibdir. Mod Security \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u0443, \u043d\u043e \u0435\u0435 \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c. \u042d\u0442\u043e \u043e\u0447\u0435\u043d\u044c \u0432\u0430\u0436\u043d\u043e, \u043d\u043e \u044d\u0442\u043e \u043d\u0435 \u0438\u0434\u0435\u0430\u043b\u044c\u043d\u044b\u0439 \u0432\u0430\u0440\u0438\u0430\u043d\u0442.<\/p>\n<\/article>","protected":false},"excerpt":{"rendered":"<p>Mod Security, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u0432\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u044d\u0442\u0438\u043c \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430\u043c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u044d\u0442\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438. Dinamik qoruma il\u0259 kibert\u0259hl\u00fck\u0259l\u0259r\u0259 qar\u015f\u0131 dayan\u0131ql\u0131 qal\u0131r.<\/p>","protected":false},"author":1,"featured_media":6637,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-6638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/posts\/6638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/comments?post=6638"}],"version-history":[{"count":1,"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/posts\/6638\/revisions"}],"predecessor-version":[{"id":6639,"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/posts\/6638\/revisions\/6639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/media\/6637"}],"wp:attachment":[{"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/media?parent=6638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/categories?post=6638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jsnet.biz\/ru\/wp-json\/wp\/v2\/tags?post=6638"}],"curies":[{"name":"WP","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}