{"id":24762,"date":"2023-06-16T04:17:51","date_gmt":"2023-06-16T04:17:51","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=24762"},"modified":"2023-06-16T04:17:51","modified_gmt":"2023-06-16T04:17:51","slug":"openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/","title":{"rendered":"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>Recently, NSFOCUS CERT detected an identity authentication bypass vulnerability in the Openfire console (CVE-2023-32315). The Admin Console of Openfire is a web-based application that has been found to be vulnerable to path traversal attacks by setting up the environment. Unauthenticated attackers use the unauthenticated Openfire setting environment in a configured Openfire environment to access the administrator user interface, gain server privileges, and ultimately execute arbitrary code on the target system. At present, the details of the vulnerability and PoC have been made public. Please take measures for protection as soon as possible.<\/p>\n\n\n\n<p>Reference link: <a href=\"https:\/\/github.com\/igniterealtime\/Openfire\/security\/advisories\/GHSA-gw42-f939-fhvm\">https:\/\/github.com\/igniterealtime\/Openfire\/security\/advisories\/GHSA-gw42-f939-fhvm<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected version<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3.10.0 &lt;= Openfire &lt;= 3.10.3<\/li>\n\n\n\n<li>4.0.0 &lt;= Openfire &lt;= 4.0.4<\/li>\n\n\n\n<li>4.1.0 &lt;= Openfire &lt;= 4.1.6<\/li>\n\n\n\n<li>4.2.0 &lt;= Openfire &lt;= 4.2.4<\/li>\n\n\n\n<li>4.3.0 &lt;= Openfire &lt;= 4.3.2<\/li>\n\n\n\n<li>4.4.0 &lt;= Openfire &lt;= 4.4.4<\/li>\n\n\n\n<li>4.5.0 &lt;= Openfire &lt;= 4.5.6<\/li>\n\n\n\n<li>4.6.0 &lt;= Openfire &lt;= 4.6.7<\/li>\n\n\n\n<li>4.7.0 &lt;= Openfire &lt;= 4.7.4<\/li>\n<\/ul>\n\n\n\n<p><strong>Unaffected version<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Openfire = 4.6.8<\/li>\n\n\n\n<li>Openfire = 4.7.5<\/li>\n\n\n\n<li>Openfire = 4.8.0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Official upgrade<\/strong><\/p>\n\n\n\n<p>Currently, the official security version has been released to fix this vulnerability. It is recommended that affected users upgrade their protection in a timely manner:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Openfire version<\/strong><\/td><td><strong>Link<\/strong><\/td><\/tr><tr><td>Openfire 4.6.8<\/td><td>https:\/\/github.com\/igniterealtime\/Openfire\/releases\/tag\/v4.6.8<\/td><\/tr><tr><td>Openfire 4.7.5<\/td><td>https:\/\/github.com\/igniterealtime\/Openfire\/releases\/tag\/v4.7.5<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Mitigation measures<\/strong><\/p>\n\n\n\n<p>If it is not convenient to upgrade, network access to the Openfire administrator console can be restricted, only open to trusted addresses, and not exposed to the internet.<\/p>\n\n\n\n<p>Use the AuthFilterSanitizer plugin, which periodically removes easily abused entries in Openfire authentication filters, thereby closing potential avenues of attack. <\/p>\n\n\n\n<p>Note: Using the authentication filter cleaner plugin may interfere with the functionality of items in Openfire authentication filters that are susceptible to abuse.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company\u2019s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world\u2019s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n\n\n\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, NSFOCUS CERT detected an identity authentication bypass vulnerability in the Openfire console (CVE-2023-32315). The Admin Console of Openfire is a web-based application that has been found to be vulnerable to path traversal attacks by setting up the environment. Unauthenticated attackers use the unauthenticated Openfire setting environment in a configured Openfire environment to access [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[333,565],"class_list":["post-24762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response","tag-cvs-2023-32315","tag-openfire"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, NSFOCUS CERT detected an identity authentication bypass vulnerability in the Openfire console (CVE-2023-32315). The Admin Console of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-16T04:17:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1029-5.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, NSFOCUS CERT detected an identity authentication bypass vulnerability in the Openfire console (CVE-2023-32315). The Admin Console of\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1029-5.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification\",\"datePublished\":\"2023-06-16T04:17:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/\"},\"wordCount\":500,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/1029-5.jpg\",\"keywords\":[\"CVS 2023-32315\",\"Openfire\"],\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/\",\"name\":\"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/1029-5.jpg\",\"datePublished\":\"2023-06-16T04:17:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/1029-5.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/1029-5.jpg\",\"width\":782,\"height\":379,\"caption\":\"Graph of IP addresses with Level 5 DDoS.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification - NSFOCUS","og_description":"Overview Recently, NSFOCUS CERT detected an identity authentication bypass vulnerability in the Openfire console (CVE-2023-32315). The Admin Console of","og_url":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/","og_site_name":"NSFOCUS","article_published_time":"2023-06-16T04:17:51+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1029-5.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification - NSFOCUS","twitter_description":"Overview Recently, NSFOCUS CERT detected an identity authentication bypass vulnerability in the Openfire console (CVE-2023-32315). The Admin Console of","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1029-5.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification","datePublished":"2023-06-16T04:17:51+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/"},"wordCount":500,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1029-5.jpg","keywords":["CVS 2023-32315","Openfire"],"articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/","url":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/","name":"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1029-5.jpg","datePublished":"2023-06-16T04:17:51+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1029-5.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/10\/1029-5.jpg","width":782,"height":379,"caption":"Graph of IP addresses with Level 5 DDoS."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/openfire-console-identity-authentication-bypass-vulnerability-cvs-2023-32315-notification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Openfire Console Identity Authentication Bypass Vulnerability (CVS 2023-32315) Notification"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/24762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=24762"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/24762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/11869"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=24762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=24762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=24762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}