{"id":19426,"date":"2022-04-02T07:02:32","date_gmt":"2022-04-02T07:02:32","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=19426"},"modified":"2026-04-17T18:07:44","modified_gmt":"2026-04-17T18:07:44","slug":"spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/","title":{"rendered":"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>Recently, NSFOCUS CERT detected a remote code execution vulnerability in Spring related frameworks. Unauthorized remote attackers can construct HTTP requests to write malicious programs on the target system to execute arbitrary code. This vulnerability is Spring framework remote code execution vulnerability. (CVE-2010-1622), but it has a wider impact. Officials have released versions 5.2.20.RELEASE and 5.3.18 in the afternoon of Mar 31 to fix this vulnerability. At present, the PoC has been made public, please relevant users as soon as possible Take measures to investigate and protect.<\/p>\n\n\n\n<p>NSFOCUS has successfully reproduced the vulnerability:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401a.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"557\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401a-1024x557.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19438\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401a-1024x557.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401a-300x163.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401a-768x418.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401a-1536x836.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401a-2048x1115.jpg 2048w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401a-600x327.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401a-200x109.jpg 200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Reference link: <a href=\"https:\/\/spring.io\/blog\/2022\/03\/31\/spring-framework-rce-early-announcement\">https:\/\/spring.io\/blog\/2022\/03\/31\/spring-framework-rce-early-announcement<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected version<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Spring Framework &lt; 5.3.18<\/li><li>Spring Framework &lt; 5.2.20<\/li><\/ul>\n\n\n\n<p>and its derivatives:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>JDK &acirc;&permil;&yen; 9<\/li><li>JRE &acirc;&permil;&yen; 9<\/li><\/ul>\n\n\n\n<p><strong>Unaffected version<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Spring Framework = 5.3.18<\/li><li>Spring Framework = 5.2.20<\/li><\/ul>\n\n\n\n<p>or<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>JDK &lt; 9<\/li><li>JRE &lt; 9<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability detection<\/h2>\n\n\n\n<p><strong>Vulnerability investigation<\/strong><\/p>\n\n\n\n<p>1. Detect whether the Spring framework is used. If it is not used, the vulnerability does not exist.<\/p>\n\n\n\n<p>Since Java projects have different packaging methods, Spring Bean is often packaged as a basic component Lib, and non-standard naming, etc., it is recommended to use automatic iterative decompression of jars and match spring-beans-*.jar with CachedIntrospectionResults.class. search. If there is a match, the Spring framework is used.<\/p>\n\n\n\n<p><strong>It is recommended to use the D-Eyes tool provided by NSFOCUS CERT for automated scanning.<\/strong><\/p>\n\n\n\n<p>According to the vulnerability information, a local inspection tool &#8220;D-Eyes Emergency Response Tool Spring Vulnerability Inspection Special Edition&#8221; has been urgently developed, which is suitable for Windows and Linux systems. This tool can be used not only to detect CVE-2022-22965 but also webshell as well. For relevant customers, please contact <a href=\"mailto:support@nsfocusglobal.com\">support@nsfocusglobal.com<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401b.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401b-1024x484.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19440\" width=\"768\" height=\"363\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401b-1024x484.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401b-300x142.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401b-768x363.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401b-600x284.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401b-200x95.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401b.png 1450w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><\/figure>\n\n\n\n<p>2. Check whether the project uses Spring parameter binding. If it is not used, the vulnerability does not exist.<\/p>\n\n\n\n<p>Since this vulnerability requires the use of SpringMVC&#8217;s parameter binding, project-related developers who do not use parameter binding are not affected by this vulnerability.<\/p>\n\n\n\n<p>3. Check the JDK version used by the middleware. If the version number is less than 9, the vulnerability does not exist.<\/p>\n\n\n\n<p>First, through the system process, confirm the JDK path used by the middleware, and execute &#8220;java -version&#8221; on the command line to obtain the currently used JDK version.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401c.jpg\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401c.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19442\" width=\"728\" height=\"205\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401c.jpg 971w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401c-300x84.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401c-768x216.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401c-600x169.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401c-200x56.jpg 200w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><\/figure>\n\n\n\n<p>4. Check whether the currently used middleware is Tomcat. If Tomcat is not used, it is not affected by this vulnerability.<\/p>\n\n\n\n<p>The currently disclosed exploit code is only for Tomcat middleware, but it is not ruled out that new exploit code will appear in the future, so there is still the possibility of risk for non-Tomcat middleware.<\/p>\n\n\n\n<p>5. Check whether AccessLog is enabled in Tomcat. If it is not enabled, it is not affected by this vulnerability.<\/p>\n\n\n\n<p>The currently disclosed vulnerability exploit code implements backdoor file writing by overwriting Tomcat&#8217;s log-related configuration. Therefore, if AccessLog is not enabled, it will not be affected by this vulnerability for the time being, but it cannot be ruled out that new exploitation methods will appear in the future.<\/p>\n\n\n\n<p>In the server.xml configuration file, the AccessLog related configuration can be located through the org.apache.catalina.valves.AccessLogValve keyword.<\/p>\n\n\n\n<p><strong>Product investigation<\/strong><\/p>\n\n\n\n<p>NSFOCUS RSAS, WVSS, UTS and ISOP have the ability to scan and monitor this vulnerability, users who deployed devices about shall upgrade to the latest version.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>&nbsp;<\/td><td><strong>Upgrade package version<\/strong><\/td><td><strong>Download link<\/strong><\/td><td><strong>Rule No.<\/strong><\/td><\/tr><tr><td><strong>RSAS V6 System plugin package<\/strong><\/td><td>V6.0R02F01.2610<\/td><td>http:\/\/update.nsfocus.com\/update\/listRsasDetail\/v\/vulsys<\/td><td>Spring Framework Remote Code Execution Vulnerability<\/td><\/tr><tr><td><strong>RSAS V6 Web plugin package<\/strong><\/td><td>V6.0R02F00.2506<\/td><td>http:\/\/update.nsfocus.com\/update\/listRsasDetail\/v\/vulweb<\/td><\/tr><tr><td><strong>WVSS V6 plugin upgrade package<\/strong><\/td><td>V6.0R03F00.243<\/td><td>http:\/\/update.nsfocus.com\/update\/listWvssDetail\/v\/6\/t\/plg<\/td><\/tr><tr><td><strong>UTS<\/strong><\/td><td>5.6.10.27310<\/td><td>http:\/\/update.nsfocus.com\/update\/listBsaUtsDetail\/v\/rule2.0.0<\/td><td>25531<\/td><\/tr><tr><td><strong>ISOP<\/strong><\/td><td>1.0.0.1.1049929<\/td><td>https:\/\/update.nsfocus.com\/update\/listisopdetail\/v\/V3.0R01F00NG<\/td><td>491077<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Attack investigation<\/h2>\n\n\n\n<p>If the above detection is passed, if it is confirmed that the vulnerability exists, the following methods can be used to check whether it is attacked.<\/p>\n\n\n\n<p><strong>1. Anomaly field detection<\/strong><\/p>\n\n\n\n<p>Since the currently disclosed exploit code will affect some fields of AccessLogValve and StandardHost, you can scan the relevant fields by executing the script provided by NSFOCUS CERT under Tomcat to detect the attack traces.<\/p>\n\n\n\n<p>This detection method is only valid under the premise that the JVM has not been restarted or the content of the relevant fields has not been recovered by the attacker. Examples of normal business scan results are as follows:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401d.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401d.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19428\" width=\"490\" height=\"354\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401d.jpg 979w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401d-300x217.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401d-768x555.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401d-200x145.jpg 200w\" sizes=\"(max-width: 490px) 100vw, 490px\" \/><\/a><\/figure>\n\n\n\n<p>An example of the scan result after being attacked is as follows:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401e.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401e.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19430\" width=\"490\" height=\"355\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401e.jpg 979w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401e-300x218.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401e-768x557.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401e-200x145.jpg 200w\" sizes=\"(max-width: 490px) 100vw, 490px\" \/><\/a><\/figure>\n\n\n\n<p>2. Logs and backdoor files After the currently disclosed exploit code is executed, Tomcat will no longer generate a new AccessLog. You can check whether the latest AccessLog is missing to determine whether it is under attack.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401f.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401f.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19444\" width=\"508\" height=\"92\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401f.jpg 1016w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401f-300x54.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401f-768x138.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401f-600x108.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401f-200x36.jpg 200w\" sizes=\"(max-width: 508px) 100vw, 508px\" \/><\/a><\/figure>\n\n\n\n<p>Check whether there are suspicious backdoor files in the Tomcat-related web application directory. Since the attacker has modified some AccessLog configuration fields, there may be a large number of &#8220;-&#8221; in the file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401g.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401g-1024x291.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19432\" width=\"512\" height=\"146\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401g-1024x291.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401g-300x85.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401g-768x218.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401g-200x57.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401g.jpg 1332w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure>\n\n\n\n<p><strong>detect.jsp<\/strong> <strong>Code block:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142138.png\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"1024\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142138-602x1024.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19456\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142138-602x1024.png 602w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142138-176x300.png 176w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142138-588x999.png 588w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142138-200x340.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142138.png 740w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Official upgrade<\/strong><\/p>\n\n\n\n<p>At present, the official has released new versions 5.2.20.RELEASE and 5.3.18 to fix this vulnerability, please update the affected users as soon as possible for protection, download link: <a href=\"https:\/\/github.com\/spring-projects\/spring-framework\/releases\">https:\/\/github.com\/spring-projects\/spring-framework\/releases<\/a><\/p>\n\n\n\n<p><strong>Product protection<\/strong><\/p>\n\n\n\n<p>In response to the above vulnerabilities, NSFOCUS&#8217;s Web Application Protection System (WAF) and Network Intrusion Prevention System (IPS) have released rule upgrade packages, and relevant users are requested to upgrade the rule packages to the latest version to form security product protection capabilities. The number of safety protection product rules is as follows:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Safety protection products<\/strong><\/td><td><strong>Upgrade package version<\/strong><\/td><td><strong>Download link<\/strong><\/td><td><strong>Rule No.<\/strong><\/td><\/tr><tr><td><strong>IPS<\/strong><\/td><td>5.6.11.27310<\/td><td>http:\/\/update.nsfocus.com\/update\/listNewipsDetail\/v\/rule5.6.11<\/td><td>[25531]<\/td><\/tr><tr><td>5.6.10.27310<\/td><td>http:\/\/update.nsfocus.com\/update\/listNewipsDetail\/v\/rule5.6.10<\/td><\/tr><tr><td><strong>WAF<\/strong><\/td><td>6.0.7.3.54053<\/td><td>http:\/\/update.nsfocus.com\/update\/listWafV67Detail\/v\/rule6070<\/td><td>27005093<\/td><\/tr><tr><td>6.0.7.0.54053<\/td><td>http:\/\/update.nsfocus.com\/update\/listWafSpecialDetail\/v\/all<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Note: If you want to apply a rule, check the corresponding rule number above for the protected site.<\/p>\n\n\n\n<p>The pre-WAF web server\/plugin protection rule (ID: 27002873) also supports protection against this vulnerability by default:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401h.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"502\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401h-1024x502.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19435\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401h-1024x502.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401h-300x147.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401h-768x377.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401h-1536x754.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401h-200x98.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401h.png 1914w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401i-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"777\" height=\"547\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401i-1.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19454\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401i-1.png 777w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401i-1-300x211.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401i-1-768x541.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401i-1-600x422.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401i-1-200x141.png 200w\" sizes=\"(max-width: 777px) 100vw, 777px\" \/><\/a><\/figure>\n\n\n\n<p>Please refer to the following link for the operation steps of product rule upgrade:<\/p>\n\n\n\n<p>WAF&iuml;&frac14;&scaron;<a href=\"https:\/\/mp.weixin.qq.com\/s\/7F8WCzWsuJ5T2E9e01wNog\">https:\/\/mp.weixin.qq.com\/s\/7F8WCzWsuJ5T2E9e01wNog<\/a><\/p>\n\n\n\n<p>IPS&iuml;&frac14;&scaron;<a href=\"https:\/\/mp.weixin.qq.com\/s\/DxQ3aaap8aujqZf-3VbNJg\">https:\/\/mp.weixin.qq.com\/s\/DxQ3aaap8aujqZf-3VbNJg<\/a><\/p>\n\n\n\n<p>Other related users can implement rule filtering for strings such as &acirc;&euro;&oelig;class. * &acirc;&euro; &iuml;&frac14;&OElig;&acirc;&euro;&oelig;Class.*&acirc;&euro;&iuml;&frac14;&OElig;&acirc;&euro;&oelig;*.class.*&acirc;&euro;&iuml;&frac14;&OElig;&acirc;&euro;&oelig;*.Class.*&acirc;&euro; on network protection devices such as WAF according to the actual traffic situation of the deployed business, and after deploying the filtering rules, test the business operation to avoid additional impact.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Other measurement<\/h2>\n\n\n\n<p>Affected users can use the following measures to fix the vulnerability:<\/p>\n\n\n\n<p>1. Search the setDisallowedFields method globally in the project<\/p>\n\n\n\n<p>2. If setDisallowedFields is found, add the following code to the Controller:<\/p>\n\n\n\n<p>3. If setDisallowedFields is not found, introduce Controller and use the ControllerAdvice annotation to implement global exception interception. The code is as follows:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401j.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"554\" height=\"202\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401j.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19449\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401j.jpg 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401j-300x109.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/0401j-200x73.jpg 200w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/a><\/figure>\n\n\n\n<p>Note: In the project source code, try not to use the setDisallowedFields method repeatedly, otherwise the global Controller will fail.<\/p>\n\n\n\n<p><strong>Reference code block:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142220.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142220.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19452\" width=\"403\" height=\"221\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142220.png 806w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142220-300x164.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142220-768x420.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142220-600x328.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/04\/20220402142220-200x109.png 200w\" sizes=\"(max-width: 403px) 100vw, 403px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&acirc;&euro;&trade;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&acirc;&euro;&trade;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n\n\n\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, NSFOCUS CERT detected a remote code execution vulnerability in Spring related frameworks. Unauthorized remote attackers can construct HTTP requests to write malicious programs on the target system to execute arbitrary code. This vulnerability is Spring framework remote code execution vulnerability. (CVE-2010-1622), but it has a wider impact. Officials have released versions 5.2.20.RELEASE and [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":882,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[],"class_list":["post-19426","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, NSFOCUS CERT detected a remote code execution vulnerability in Spring related frameworks. Unauthorized remote attackers can construct\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-02T07:02:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/spring.png\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, NSFOCUS CERT detected a remote code execution vulnerability in Spring related frameworks. Unauthorized remote attackers can construct\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/spring.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual\",\"datePublished\":\"2022-04-02T07:02:32+00:00\",\"dateModified\":\"2026-04-17T18:07:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/\"},\"wordCount\":1417,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/spring.png\",\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/\",\"name\":\"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/spring.png\",\"datePublished\":\"2022-04-02T07:02:32+00:00\",\"dateModified\":\"2026-04-17T18:07:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/spring.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/spring.png\",\"width\":703,\"height\":298,\"caption\":\"Spring by Pivotal logo in green.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual - NSFOCUS","og_description":"Overview Recently, NSFOCUS CERT detected a remote code execution vulnerability in Spring related frameworks. Unauthorized remote attackers can construct","og_url":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/","og_site_name":"NSFOCUS","article_published_time":"2022-04-02T07:02:32+00:00","article_modified_time":"2026-04-17T18:07:44+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/spring.png","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual - NSFOCUS","twitter_description":"Overview Recently, NSFOCUS CERT detected a remote code execution vulnerability in Spring related frameworks. Unauthorized remote attackers can construct","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/spring.png","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual","datePublished":"2022-04-02T07:02:32+00:00","dateModified":"2026-04-17T18:07:44+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/"},"wordCount":1417,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/spring.png","articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/","url":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/","name":"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/spring.png","datePublished":"2022-04-02T07:02:32+00:00","dateModified":"2026-04-17T18:07:44+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/spring.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/10\/spring.png","width":703,"height":298,"caption":"Spring by Pivotal logo in green."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/spring-framework-remote-code-execution-vulnerability-cve-2022-22965-manual\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Spring Framework Remote Code Execution Vulnerability (CVE-2022-22965) Manual"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/19426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=19426"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/19426\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/882"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=19426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=19426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=19426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}