{"id":1322,"date":"2018-05-10T09:31:49","date_gmt":"2018-05-10T09:31:49","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=1322"},"modified":"2018-05-10T09:31:49","modified_gmt":"2018-05-10T09:31:49","slug":"multiple-vulnerabilities-found-in-spring","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/multiple-vulnerabilities-found-in-spring\/","title":{"rendered":"Multiple Vulnerabilities Found in Spring"},"content":{"rendered":"<p>Spring released security advisories on May 9 local time for fixing its multiple vulnerabilities, including a critical remote code execution vulnerability.<\/p>\n<p>Reference link:\u00a0<a href=\"https:\/\/pivotal.io\/security\">https:\/\/pivotal.io\/security<\/a><\/p>\n<h3>\u00a0Vulnerability Description<\/h3>\n<h4><strong><span style=\"color: #000000; font-family: \u5b8b\u4f53;\">CVE-2018-1257 (High)<\/span><\/strong><\/h4>\n<p>Parts of Spring Framework versions allow application programs to use Spring message module to make public STOMP on WebSocket endpoint through simple memory STOMP broker. An attacker could send a specially designed message to the broker to launch denial of service attacks.<\/p>\n<p>Applications become vulnerable when all of the following requirements are met:<\/p>\n<ul>\n<li>Depend on spring-messaging and spring-websocket modules.<\/li>\n<li>Register STOMP over WebSocket endpoint.<\/li>\n<li>Enable the simple STOMP broker<\/li>\n<\/ul>\n<h4>Affected Version<\/h4>\n<ul>\n<li>Spring Framework 5.0 to 5.0.5<\/li>\n<li>Spring Framework 4.3 to 4.3.16<\/li>\n<li>Versions not supported anymore<\/li>\n<\/ul>\n<h4>Mitigation<\/h4>\n<p>Users affected by this vulnerability are advised to upgrade their systems to the following versions:<\/p>\n<ul>\n<li>5.0.x users should upgrade to 5.0.6.<\/li>\n<li>4.3.x users should upgrade to 4.3.17.<\/li>\n<li>Older versions should upgrade to a supported branch.<\/li>\n<\/ul>\n<p>Reference link: <a href=\"https:\/\/pivotal.io\/security\/cve-2018-1257\">https:\/\/pivotal.io\/security\/cve-2018-1257<\/a><\/p>\n<h4>\u00a0<strong><span style=\"color: #000000; font-family: \u5b8b\u4f53;\">CVE-2018-1258 (Critical)<\/span><\/strong><\/h4>\n<p>Spring Security in combination with Spring Framework 5.0.5.RELEASE contain an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.<\/p>\n<h4>Affected Versions<\/h4>\n<ul>\n<li>Spring Framework 5.0.5.RELEASE + Spring Security (any version)<\/li>\n<\/ul>\n<h4>Mitigation<\/h4>\n<p>Users leveraging Spring Security&#8217;s method security should ensure they are using Spring Framework 5.0.6.RELEASE or newer.<\/p>\n<p>Reference Link: <a href=\"https:\/\/pivotal.io\/security\/cve-2018-1258\">https:\/\/pivotal.io\/security\/cve-2018-1258<\/a><\/p>\n<h4><strong><span style=\"color: #000000; font-family: \u5b8b\u4f53;\">CVE-2018-1259 (High)<\/span><\/strong><\/h4>\n<p>Parts of Spring Data Commons versions have external entity reference vulnerability. Unauthenticated remote malicious users could supply specially crafted request parameters against Spring Data\u2019s projection-based request payload binding to access arbitrary files on the system. This vulnerability has impact on users using XMLBeam. The use of authentication and authorization for endpoints, both of which are provided by Spring Security, limits exposure to this vulnerability to authorized users.<\/p>\n<p>Affected Versions<\/p>\n<ul>\n<li>Spring Data Commons 1.13 to 1.13.11 (Ingalls SR11)<\/li>\n<li>Spring Data REST 2.6 to 2.6.11 (Ingalls SR11)<\/li>\n<li>Spring Data Commons 2.0 to 2.0.6 (Kay SR6)<\/li>\n<li>Spring Data REST 3.0 to 3.0.6 (Kay SR6)<\/li>\n<\/ul>\n<p>Mitigation<\/p>\n<p>Users affected by this vulnerability should upgrade their system to the following versions:<\/p>\n<ul>\n<li>1.13.x users should upgrade to 1.13.12 (Ingalls SR12)<\/li>\n<li>2.0.x users should upgrade to 2.0.7 (Kay SR7)<\/li>\n<li>Alternatively, upgrade to XMLBeam 1.4.15<\/li>\n<li>Spring Data REST 2.6.12 (Ingalls SR12)<\/li>\n<li>Spring Data REST 3.0.7 (Kay SR7)<\/li>\n<\/ul>\n<h4><span style=\"color: #000000; font-family: \u5b8b\u4f53;\">Reference link: <a href=\"https:\/\/pivotal.io\/security\/cve-2018-1259\">https:\/\/pivotal.io\/security\/cve-2018-1259<\/a><\/span><\/h4>\n<h4><strong><span style=\"color: #000000; font-family: \u5b8b\u4f53;\">CVE-2018-1260 (Critical)<\/span><\/strong><\/h4>\n<p>Parts of Spring Security OAuth versions contain a remote code execution vulnerability. A malicious user or attacker can craft an authorization request to the authorization endpoint that can lead to a remote code execution when the resource owner is forwarded to the approval endpoint.<\/p>\n<p>This vulnerability has impact on applications that meet all of the following requirements:<\/p>\n<ul>\n<li>Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer)<\/li>\n<li>Use the default Approval Endpoint<\/li>\n<\/ul>\n<p>This vulnerability does not expose applications that:<\/p>\n<ul>\n<li>Act in the role of an Authorization Server but override the default Approval Endpoint<\/li>\n<li>Act in the role of a Resource Server only (e.g. @EnableResourceServer)<\/li>\n<li>Act in the role of a Client only (e.g. @EnableOAuthClient)<\/li>\n<\/ul>\n<h4>Affected Versions<\/h4>\n<ul>\n<li>Spring Security OAuth 2.3 to 2.3.2<\/li>\n<li>Spring Security OAuth 2.2 to 2.2.1<\/li>\n<li>Spring Security OAuth 2.1 to 2.1.1<\/li>\n<li>Spring Security OAuth 2.0 to 2.0.14<\/li>\n<li>Versions not supported anymore<\/li>\n<\/ul>\n<h4>Mitigation<\/h4>\n<p>Users affected by this vulnerability are advised to upgrade their systems the following versions:<\/p>\n<ul>\n<li>2.3.x users should upgrade to 2.3.3<\/li>\n<li>2.2.x users should upgrade to 2.2.2<\/li>\n<li>2.1.x users should upgrade to 2.1.2<\/li>\n<li>2.0.x users should upgrade to 2.0.15<\/li>\n<\/ul>\n<p>Older versions should upgrade to a supported branch.<\/p>\n<p>Reference link:<span style=\"color: #000000; font-family: \u5b8b\u4f53;\">\u00a0<a href=\"https:\/\/pivotal.io\/security\/cve-2018-1260\">https:\/\/pivotal.io\/security\/cve-2018-1260<\/a><\/span><\/p>\n<p><strong><span style=\"font-family: \u5b8b\u4f53;\"><span style=\"color: #000000;\">CVE-2018-1261 (Critical)<\/span><\/span><\/strong><\/p>\n<p>Some versions of Spring-integration-zip contains an arbitrary file writing vulnerability that could be exploited using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.<\/p>\n<p>This can only happen if an application using this library accepts and unpacks zip files from untrusted sources.<\/p>\n<h4>Affected Versions<\/h4>\n<ul>\n<li>Spring Integration Zip Community Extension Project version 1.0.0.RELEASE<\/li>\n<\/ul>\n<h4>Mitigation<\/h4>\n<p>Users affected by this vulnerability should upgrade their system to the following version<\/p>\n<ul>\n<li>1.0.1.RELEASE \uff1a<\/li>\n<\/ul>\n<p>Or do not unzip untrusted zip files.<\/p>\n<p>Reference link:<span style=\"color: #000000; font-family: \u5b8b\u4f53;\"><a href=\"https:\/\/pivotal.io\/security\/cve-2018-1261\">https:\/\/pivotal.io\/security\/cve-2018-1261<\/a><\/span><\/p>\n<p><span style=\"color: #000000; font-family: \u5b8b\u4f53;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spring released security advisories on May 9 local time for fixing its multiple vulnerabilities, including a critical remote code execution vulnerability. Reference link:\u00a0https:\/\/pivotal.io\/security \u00a0Vulnerability Description CVE-2018-1257 (High) Parts of Spring Framework versions allow application programs to use Spring message module to make public STOMP on WebSocket endpoint through simple memory STOMP broker. An attacker could [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7777,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-1322","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Multiple Vulnerabilities Found in Spring - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Multiple Vulnerabilities Found in Spring - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Spring released security advisories on May 9 local time for fixing its multiple vulnerabilities, including a critical remote code execution vulnerability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-10T09:31:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/05\/20171011143745.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Multiple Vulnerabilities Found in Spring - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Spring released security advisories on May 9 local time for fixing its multiple vulnerabilities, including a critical remote code execution vulnerability.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/05\/20171011143745.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Multiple Vulnerabilities Found in Spring\",\"datePublished\":\"2018-05-10T09:31:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/\"},\"wordCount\":686,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/20171011143745.png\",\"articleSection\":[\"Global Events\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/\",\"name\":\"Multiple Vulnerabilities Found in Spring - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/20171011143745.png\",\"datePublished\":\"2018-05-10T09:31:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/20171011143745.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/20171011143745.png\",\"width\":727,\"height\":778,\"caption\":\"Error log displaying Java exception details.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/multiple-vulnerabilities-found-in-spring\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Multiple Vulnerabilities Found in Spring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Multiple Vulnerabilities Found in Spring - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Multiple Vulnerabilities Found in Spring - NSFOCUS","og_description":"Spring released security advisories on May 9 local time for fixing its multiple vulnerabilities, including a critical remote code execution vulnerability.","og_url":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/","og_site_name":"NSFOCUS","article_published_time":"2018-05-10T09:31:49+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/05\/20171011143745.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Multiple Vulnerabilities Found in Spring - NSFOCUS","twitter_description":"Spring released security advisories on May 9 local time for fixing its multiple vulnerabilities, including a critical remote code execution vulnerability.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/05\/20171011143745.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Multiple Vulnerabilities Found in Spring","datePublished":"2018-05-10T09:31:49+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/"},"wordCount":686,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/05\/20171011143745.png","articleSection":["Global Events"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/","url":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/","name":"Multiple Vulnerabilities Found in Spring - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/05\/20171011143745.png","datePublished":"2018-05-10T09:31:49+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/05\/20171011143745.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/05\/20171011143745.png","width":727,"height":778,"caption":"Error log displaying Java exception details."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/multiple-vulnerabilities-found-in-spring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Multiple Vulnerabilities Found in Spring"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=1322"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1322\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/7777"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=1322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=1322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=1322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}