{"id":1809,"date":"2018-11-10T16:10:57","date_gmt":"2018-11-10T16:10:57","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=1809"},"modified":"2018-11-10T16:10:57","modified_gmt":"2018-11-10T16:10:57","slug":"apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/","title":{"rendered":"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert"},"content":{"rendered":"<h2>Vulnerability Overview<\/h2>\n<p>Recently, Apache Software Foundation (ASF) released a security advisory to announce the fix for an access control bypass vulnerability (CVE-2018-11759) in the mod_jk module in Apache Tomcat. Currently, the proof of concept (PoC) has been announced for this vulnerability. Users of this software should take precautions to fix this vulnerability as soon as possible.<!--more--><\/p>\n<p>Apache Tomcat JK (mod_jk) Connector is a module used to connect Tomcat to Apache or IIS. Like the one assigned CVE-2018-1323, this vulnerability (CVE-2018-11759) exists because Apache Tomcat Web Server (HTTPD)&#8217;s code which is used to normalize the requested path fails to properly handle edge cases (for example, filtering out the semicolon (;)) before mapping it to the URI-work map in Apache Tomcat JK (mod_jk) Connector. An attacker could exploit this vulnerability to bypass the intended access control via a maliciously constructed request.<\/p>\n<p>Reference link: https:\/\/lists.apache.org\/thread.html\/6d564bb0ab73d6b3efdd1d6b1c075d1a2c84ecd84a4159d6122529ad@%3Cannounce.tomcat.apache.org%3E<\/p>\n<ul>\n<li>Scope of Impact<\/li>\n<\/ul>\n<p><strong>Affected Version<\/strong><\/p>\n<ul>\n<li>Apache Group Tomcat JK (mod_jk) Connector 1.2.0-1.2.44<\/li>\n<\/ul>\n<p><strong>Unaffected Version<\/strong><\/p>\n<ul>\n<li>Apache Group Tomcat JK (mod_jk) Connector 1.2.46<\/li>\n<li>Vulnerability Check\n<ul>\n<li>Version Check<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Users can determine whether their current software version is vulnerable by running the following command to check the mod_jk.so file.<\/p>\n<p id=\"eouadsb\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1810 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5be6fdfdefa6d.png\" alt=\"\" \/><\/p>\n<ul>\n<li>Check via PoC<\/li>\n<\/ul>\n<p>Also, users can implement the PoC of this vulnerability to check whether their current module is vulnerable. Here takes 127.0.0.1 as an example. As shown in the following figure, complete the following configurations in the configuration file httpd.conf to restrict the access to 127.0.0.1.<\/p>\n<p id=\"JudQsmZ\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1811 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5be6fe19390a1.png\" alt=\"\" \/><\/p>\n<p>When localhost\/jkstatus (localhost indicates 127.0.0.1) is accessed from a local address, a message will be displayed, saying that the access is rejected.<\/p>\n<p id=\"bLSwdAh\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1812 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5be6fe31e9161.png\" alt=\"\" \/><\/p>\n<p>Appending a semicolon (;) to the preceding URL can bypass the access restriction. If the following page appears, the current mod_jk is vulnerable.<\/p>\n<h2>Vulnerability Protection<\/h2>\n<h3>Official Upgrade<\/h3>\n<p>ASF has released new versions to fix this vulnerability. Affected users should upgrade their application to V1.2.46 or later as soon as possible for effective protection.<\/p>\n<p>Users need to download the latest source code from the following link for compilation and installation:<\/p>\n<p>https:\/\/archive.apache.org\/dist\/tomcat\/tomcat-connectors\/jk\/tomcat-connectors-1.2.46-src.zip<\/p>\n<h2>Statement<\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory.<\/p>\n<p>NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2>About NSFOCUS<\/h2>\n<p>NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.<\/p>\n<p>For more information about NSFOCUS, please visit:<\/p>\n<p>https:\/\/www.nsfocusglobal.com<\/p>\n<p>NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Overview Recently, Apache Software Foundation (ASF) released a security advisory to announce the fix for an access control bypass vulnerability (CVE-2018-11759) in the mod_jk module in Apache Tomcat. Currently, the proof of concept (PoC) has been announced for this vulnerability. Users of this software should take precautions to fix this vulnerability as soon as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1815,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[17,20],"tags":[173,708,729],"class_list":["post-1809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerability-analysis","category-uncategorized","tag-cve-2018-11759","tag-unaffected-version","tag-vulnerability-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Overview Recently, Apache Software Foundation (ASF) released a security advisory to announce the fix for an access control bypass\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-10T16:10:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/a2.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Overview Recently, Apache Software Foundation (ASF) released a security advisory to announce the fix for an access control bypass\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/a2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert\",\"datePublished\":\"2018-11-10T16:10:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/\"},\"wordCount\":597,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/a2.jpg\",\"keywords\":[\"CVE-2018-11759\",\"Unaffected Version\",\"Vulnerability Protection\"],\"articleSection\":[\"Threat Analysis\",\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/\",\"name\":\"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/a2.jpg\",\"datePublished\":\"2018-11-10T16:10:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/a2.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/a2.jpg\",\"width\":295,\"height\":171,\"caption\":\"Digital lock with blue circuit background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert - NSFOCUS","og_description":"Vulnerability Overview Recently, Apache Software Foundation (ASF) released a security advisory to announce the fix for an access control bypass","og_url":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2018-11-10T16:10:57+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/a2.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert - NSFOCUS","twitter_description":"Vulnerability Overview Recently, Apache Software Foundation (ASF) released a security advisory to announce the fix for an access control bypass","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/a2.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert","datePublished":"2018-11-10T16:10:57+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/"},"wordCount":597,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/a2.jpg","keywords":["CVE-2018-11759","Unaffected Version","Vulnerability Protection"],"articleSection":["Threat Analysis","Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/","name":"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/a2.jpg","datePublished":"2018-11-10T16:10:57+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/a2.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/a2.jpg","width":295,"height":171,"caption":"Digital lock with blue circuit background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apache-mod_jk-access-control-bypass-vulnerability-cve-2018-11759-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Apache mod_jk Access Control Bypass Vulnerability (CVE-2018-11759) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=1809"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1809\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/1815"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=1809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=1809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=1809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}