{"id":623,"date":"2021-12-17T08:45:11","date_gmt":"2021-12-17T07:45:11","guid":{"rendered":"https:\/\/setblau.com\/blog\/?p=623"},"modified":"2025-01-17T18:04:57","modified_gmt":"2025-01-17T17:04:57","slug":"log4shell","status":"publish","type":"post","link":"https:\/\/setblau.com\/blog\/log4shell\/","title":{"rendered":"Log4Shell"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">La vulnerabilidad cr\u00edtica m\u00e1s extendida<\/h2>\n\n\n\n<p>Chen Zhaojun, investigador de Alibaba Cloud Security Team, ha descubierto una vulnerabilidad 0 day cr\u00edtica, denominada Log4Shell, que podr\u00eda ser explotada por un atacante remoto para ejecutar c\u00f3digo malicioso.<\/p>\n\n\n\n<p>La vulnerabilidad afecta a Apache Log4j, una biblioteca desarrollada por Apache Software Foundation para el desarrollo de aplicaciones en Java. Java es un lenguaje de programaci\u00f3n con el que est\u00e1n creados muchos de los programas y aplicaciones usados en los ordenadores, p\u00e1ginas web, etc. por lo que millones de usuarios de cientos de servicios online podr\u00edan verse potencialmente afectados.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Recursos afectados<\/h2>\n\n\n\n<p>Est\u00e1n afectados todos los productos que utilizan la&nbsp;<a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\" target=\"_blank\" rel=\"noreferrer noopener\">librer\u00eda Log4j2<\/a>&nbsp;mantenida por Apache Fundation, desde la versi\u00f3n 2.0-beta9 hasta la versi\u00f3n 2.14.1 Esta librer\u00eda es utilizada en muchos productos, tanto comerciales como en desarrollos propios basados en Java.<\/p>\n\n\n\n<p>Para saber qu\u00e9 fabricantes y productos est\u00e1n afectados, se puede consultar el&nbsp;<a href=\"https:\/\/www.incibe-cert.es\/alerta-temprana\/avisos-seguridad\/log4shell-vulnerabilidad-0day-ejecucion-remota-codigo-apache-log4j\" target=\"_blank\" rel=\"noreferrer noopener\">aviso de seguridad publicado en INCIBE-CERT sobre Log4Shell<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Soluci\u00f3n<\/h2>\n\n\n\n<p>Revisa qu\u00e9 sistemas, programas, aplicaciones, juegos, etc. utilizas de los que est\u00e1n afectados por este fallo de seguridad -ver apartado \u201cRecursos afectados\u201d- y comprueba en su p\u00e1gina web si recientemente se ha publicado una nueva versi\u00f3n, es decir, hay una actualizaci\u00f3n del mismo, que resuelva el problema detectado.<\/p>\n\n\n\n<p>Es muy importante realizar esta actualizaci\u00f3n en cuanto est\u00e9 disponible para poder corregir la vulnerabilidad provocada por Log4Shell y as\u00ed tener as\u00ed nuestros programas y aplicaciones protegidos.<\/p>\n\n\n\n<p>En muchos programas, si tienes el sistema de actualizaciones autom\u00e1ticas activas, te avisar\u00e1 de que existe una nueva actualizaci\u00f3n cuando est\u00e9 disponible. En cualquier caso, permanece atento ya que pueden aparecer nuevos programas o servicios afectados por Log4Shell o cualquier otra vulnerabilidad que se detecte y, por tanto, deber\u00e1s actualizar el software, hardware y firmware de tus dispositivos siempre que haya disponible una actualizaci\u00f3n.<\/p>\n\n\n\n<p>Para ayudarte en este proceso, te facilitamos el siguiente contenido:&nbsp;<a href=\"https:\/\/www.osi.es\/es\/actualidad\/blog\/2021\/07\/28\/aprende-mantener-actualizados-tus-dispositivos-programas-y-aplicaciones\">Aprende a mantener actualizados tus dispositivos, programas y aplicaciones<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Detalles<\/h2>\n\n\n\n<p>Como su propio nombre indica, una vulnerabilidad de d\u00eda cero o Zero Day es un tipo de vulnerabilidad que acaba de ser descubierta y que a\u00fan no tiene un parche que la solucione. La principal amenaza reside en que, hasta que se lanza dicho parche correctivo y los usuarios lo instalan en sus equipos, los atacantes tienen v\u00eda libre para explotar la vulnerabilidad y sacar provecho del fallo de seguridad. A este tipo de ataques se les denomina ataques de d\u00eda cero o Zero day attack.<\/p>\n\n\n\n<p>La forma de protegerse de estas vulnerabilidades es la siguiente:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Activa todas las herramientas de protecci\u00f3n de las que dispongas. Un&nbsp;<a href=\"https:\/\/www.osi.es\/es\/actualidad\/blog\/2013\/11\/04\/antivirus-siempre-activados-y-actualizados\">antivirus instalado y actualizado<\/a>&nbsp;puede suponer la diferencia entre un dispositivo infectado y una amenaza contenida.<\/li><li>Mant\u00e9n&nbsp;<a href=\"https:\/\/www.osi.es\/es\/actualizaciones-de-seguridad\">actualizado todo el software<\/a>&nbsp;que utilices. Las actualizaciones solucionan errores, cierran brechas y vulnerabilidades que han sido descubiertas, como es el caso de las de d\u00eda cero o 0-Day.<\/li><li>A\u00f1ade una capa extra de seguridad; identifica el software, hardware o firmware que tienes instalado y suscr\u00edbete al bolet\u00edn y avisos de actualidad tanto de dicho software como de la&nbsp;<a href=\"https:\/\/www.osi.es\/es\/boletines\/suscribirse?opcion=si\">OSI<\/a>. De este modo, estar\u00e1s informado ante posibles novedades y amenazas relacionadas con el sistema operativo, programa o app<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Referencias:<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.incibe-cert.es\/alerta-temprana\/avisos-seguridad\/log4shell-vulnerabilidad-0day-ejecucion-remota-codigo-apache-log4j\">https:\/\/www.incibe-cert.es\/alerta-temprana\/avisos-seguridad\/log4shell-vulnerabilidad-0day-ejecucion-remota-codigo-apache-log4j<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Descubre todo sobre Log4Shell, una vulnerabilidad cr\u00edtica en Apache Log4j que expone millones de sistemas a ataques remotos. Aprende c\u00f3mo proteger tus aplicaciones y mitigar riesgos de seguridad.<\/p>\n","protected":false},"author":3,"featured_media":626,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[449,450,453,452,448,82,454,48,445,103,447,455,451,446],"class_list":["post-623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-java","tag-actualizacion-de-software","tag-apache-log4j","tag-ataques-dia-cero","tag-ciberseguridad","tag-ejecucion-remota-de-codigo","tag-hack","tag-incibe-cert","tag-java","tag-log4shell","tag-parches-de-seguridad","tag-proteccion-de-sistemas","tag-seguridad-en-aplicaciones","tag-seguridad-informatica","tag-vulnerabilidad-0-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Log4Shell - Setblau<\/title>\n<meta name=\"description\" content=\"Descubre todo sobre Log4Shell, una vulnerabilidad cr\u00edtica en Apache Log4j que expone millones de sistemas a ataques remotos. Aprende c\u00f3mo proteger tus aplicaciones y mitigar riesgos de seguridad.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/setblau.com\/blog\/log4shell\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4Shell - Setblau\" \/>\n<meta property=\"og:description\" content=\"Descubre todo sobre Log4Shell, una vulnerabilidad cr\u00edtica en Apache Log4j que expone millones de sistemas a ataques remotos. Aprende c\u00f3mo proteger tus aplicaciones y mitigar riesgos de seguridad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/setblau.com\/blog\/log4shell\/\" \/>\n<meta property=\"og:site_name\" content=\"Setblau\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/setblau\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-17T07:45:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T17:04:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/setblau.com\/blog\/wp-content\/uploads\/2021\/12\/pexels-pixabay-207580-e1639727071108.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"233\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Llu\u00eds Gonz\u00e0lez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Setblau\" \/>\n<meta name=\"twitter:site\" content=\"@Setblau\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Llu\u00eds Gonz\u00e0lez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/\"},\"author\":{\"name\":\"Llu\u00eds Gonz\u00e0lez\",\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/#\\\/schema\\\/person\\\/66c35168882c827bb8dc164524a3da4a\"},\"headline\":\"Log4Shell\",\"datePublished\":\"2021-12-17T07:45:11+00:00\",\"dateModified\":\"2025-01-17T17:04:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/\"},\"wordCount\":578,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/setblau.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/pexels-pixabay-207580-e1639727071108.jpg\",\"keywords\":[\"actualizaci\u00f3n de software\",\"Apache Log4j\",\"ataques d\u00eda cero\",\"ciberseguridad\",\"ejecuci\u00f3n remota de c\u00f3digo\",\"hack\",\"INCIBE-CERT\",\"java\",\"Log4Shell\",\"Parches de seguridad\",\"protecci\u00f3n de sistemas\",\"seguridad en aplicaciones\",\"seguridad inform\u00e1tica\",\"vulnerabilidad 0-day\"],\"articleSection\":[\"Java\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/\",\"url\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/\",\"name\":\"Log4Shell - Setblau\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/setblau.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/pexels-pixabay-207580-e1639727071108.jpg\",\"datePublished\":\"2021-12-17T07:45:11+00:00\",\"dateModified\":\"2025-01-17T17:04:57+00:00\",\"description\":\"Descubre todo sobre Log4Shell, una vulnerabilidad cr\u00edtica en Apache Log4j que expone millones de sistemas a ataques remotos. Aprende c\u00f3mo proteger tus aplicaciones y mitigar riesgos de seguridad.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/#primaryimage\",\"url\":\"https:\\\/\\\/setblau.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/pexels-pixabay-207580-e1639727071108.jpg\",\"contentUrl\":\"https:\\\/\\\/setblau.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/pexels-pixabay-207580-e1639727071108.jpg\",\"width\":640,\"height\":233,\"caption\":\"directorio linux\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/log4shell\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/setblau.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Log4Shell\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/setblau.com\\\/blog\\\/\",\"name\":\"Setblau\",\"description\":\"Tutoriales y novedades\",\"publisher\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/setblau.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/#organization\",\"name\":\"Setblau\",\"url\":\"https:\\\/\\\/setblau.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/setblau.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/11\\\/setblau.gif\",\"contentUrl\":\"https:\\\/\\\/setblau.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/11\\\/setblau.gif\",\"width\":394,\"height\":83,\"caption\":\"Setblau\"},\"image\":{\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/setblau\",\"https:\\\/\\\/x.com\\\/Setblau\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/setblau.com\\\/blog\\\/#\\\/schema\\\/person\\\/66c35168882c827bb8dc164524a3da4a\",\"name\":\"Llu\u00eds Gonz\u00e0lez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9104069be4bfdffbd23837a15a8bd394dc6ebccfd101b9a57e30743adafe7d9f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9104069be4bfdffbd23837a15a8bd394dc6ebccfd101b9a57e30743adafe7d9f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9104069be4bfdffbd23837a15a8bd394dc6ebccfd101b9a57e30743adafe7d9f?s=96&d=mm&r=g\",\"caption\":\"Llu\u00eds Gonz\u00e0lez\"},\"description\":\"Director and Founder from setblau.com\",\"sameAs\":[\"http:\\\/\\\/www.setblau.com\"],\"url\":\"https:\\\/\\\/setblau.com\\\/blog\\\/author\\\/lgonzalez\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log4Shell - Setblau","description":"Descubre todo sobre Log4Shell, una vulnerabilidad cr\u00edtica en Apache Log4j que expone millones de sistemas a ataques remotos. Aprende c\u00f3mo proteger tus aplicaciones y mitigar riesgos de seguridad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/setblau.com\/blog\/log4shell\/","og_locale":"es_ES","og_type":"article","og_title":"Log4Shell - Setblau","og_description":"Descubre todo sobre Log4Shell, una vulnerabilidad cr\u00edtica en Apache Log4j que expone millones de sistemas a ataques remotos. Aprende c\u00f3mo proteger tus aplicaciones y mitigar riesgos de seguridad.","og_url":"https:\/\/setblau.com\/blog\/log4shell\/","og_site_name":"Setblau","article_publisher":"https:\/\/www.facebook.com\/setblau","article_published_time":"2021-12-17T07:45:11+00:00","article_modified_time":"2025-01-17T17:04:57+00:00","og_image":[{"width":640,"height":233,"url":"https:\/\/setblau.com\/blog\/wp-content\/uploads\/2021\/12\/pexels-pixabay-207580-e1639727071108.jpg","type":"image\/jpeg"}],"author":"Llu\u00eds Gonz\u00e0lez","twitter_card":"summary_large_image","twitter_creator":"@Setblau","twitter_site":"@Setblau","twitter_misc":{"Escrito por":"Llu\u00eds Gonz\u00e0lez","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/setblau.com\/blog\/log4shell\/#article","isPartOf":{"@id":"https:\/\/setblau.com\/blog\/log4shell\/"},"author":{"name":"Llu\u00eds Gonz\u00e0lez","@id":"https:\/\/setblau.com\/blog\/#\/schema\/person\/66c35168882c827bb8dc164524a3da4a"},"headline":"Log4Shell","datePublished":"2021-12-17T07:45:11+00:00","dateModified":"2025-01-17T17:04:57+00:00","mainEntityOfPage":{"@id":"https:\/\/setblau.com\/blog\/log4shell\/"},"wordCount":578,"commentCount":0,"publisher":{"@id":"https:\/\/setblau.com\/blog\/#organization"},"image":{"@id":"https:\/\/setblau.com\/blog\/log4shell\/#primaryimage"},"thumbnailUrl":"https:\/\/setblau.com\/blog\/wp-content\/uploads\/2021\/12\/pexels-pixabay-207580-e1639727071108.jpg","keywords":["actualizaci\u00f3n de software","Apache Log4j","ataques d\u00eda cero","ciberseguridad","ejecuci\u00f3n remota de c\u00f3digo","hack","INCIBE-CERT","java","Log4Shell","Parches de seguridad","protecci\u00f3n de sistemas","seguridad en aplicaciones","seguridad inform\u00e1tica","vulnerabilidad 0-day"],"articleSection":["Java"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/setblau.com\/blog\/log4shell\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/setblau.com\/blog\/log4shell\/","url":"https:\/\/setblau.com\/blog\/log4shell\/","name":"Log4Shell - Setblau","isPartOf":{"@id":"https:\/\/setblau.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/setblau.com\/blog\/log4shell\/#primaryimage"},"image":{"@id":"https:\/\/setblau.com\/blog\/log4shell\/#primaryimage"},"thumbnailUrl":"https:\/\/setblau.com\/blog\/wp-content\/uploads\/2021\/12\/pexels-pixabay-207580-e1639727071108.jpg","datePublished":"2021-12-17T07:45:11+00:00","dateModified":"2025-01-17T17:04:57+00:00","description":"Descubre todo sobre Log4Shell, una vulnerabilidad cr\u00edtica en Apache Log4j que expone millones de sistemas a ataques remotos. Aprende c\u00f3mo proteger tus aplicaciones y mitigar riesgos de seguridad.","breadcrumb":{"@id":"https:\/\/setblau.com\/blog\/log4shell\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/setblau.com\/blog\/log4shell\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/setblau.com\/blog\/log4shell\/#primaryimage","url":"https:\/\/setblau.com\/blog\/wp-content\/uploads\/2021\/12\/pexels-pixabay-207580-e1639727071108.jpg","contentUrl":"https:\/\/setblau.com\/blog\/wp-content\/uploads\/2021\/12\/pexels-pixabay-207580-e1639727071108.jpg","width":640,"height":233,"caption":"directorio linux"},{"@type":"BreadcrumbList","@id":"https:\/\/setblau.com\/blog\/log4shell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/setblau.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Log4Shell"}]},{"@type":"WebSite","@id":"https:\/\/setblau.com\/blog\/#website","url":"https:\/\/setblau.com\/blog\/","name":"Setblau","description":"Tutoriales y novedades","publisher":{"@id":"https:\/\/setblau.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/setblau.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/setblau.com\/blog\/#organization","name":"Setblau","url":"https:\/\/setblau.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/setblau.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/setblau.com\/blog\/wp-content\/uploads\/2015\/11\/setblau.gif","contentUrl":"https:\/\/setblau.com\/blog\/wp-content\/uploads\/2015\/11\/setblau.gif","width":394,"height":83,"caption":"Setblau"},"image":{"@id":"https:\/\/setblau.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/setblau","https:\/\/x.com\/Setblau"]},{"@type":"Person","@id":"https:\/\/setblau.com\/blog\/#\/schema\/person\/66c35168882c827bb8dc164524a3da4a","name":"Llu\u00eds Gonz\u00e0lez","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/9104069be4bfdffbd23837a15a8bd394dc6ebccfd101b9a57e30743adafe7d9f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9104069be4bfdffbd23837a15a8bd394dc6ebccfd101b9a57e30743adafe7d9f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9104069be4bfdffbd23837a15a8bd394dc6ebccfd101b9a57e30743adafe7d9f?s=96&d=mm&r=g","caption":"Llu\u00eds Gonz\u00e0lez"},"description":"Director and Founder from setblau.com","sameAs":["http:\/\/www.setblau.com"],"url":"https:\/\/setblau.com\/blog\/author\/lgonzalez\/"}]}},"_links":{"self":[{"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/posts\/623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/comments?post=623"}],"version-history":[{"count":4,"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/posts\/623\/revisions"}],"predecessor-version":[{"id":810,"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/posts\/623\/revisions\/810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/media\/626"}],"wp:attachment":[{"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/media?parent=623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/categories?post=623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/setblau.com\/blog\/wp-json\/wp\/v2\/tags?post=623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}