{"id":26437,"date":"2023-09-28T07:18:47","date_gmt":"2023-09-28T07:18:47","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=26437"},"modified":"2023-09-28T07:18:47","modified_gmt":"2023-09-28T07:18:47","slug":"jumpserver-multiple-security-vulnerabilities-notification","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/jumpserver-multiple-security-vulnerabilities-notification\/","title":{"rendered":"JumpServer Multiple Security Vulnerabilities Notification"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>Recently, NSFOCUS CERT monitored that JumpServer officially issued a notice to fix multiple security vulnerabilities. The vulnerabilities are detailed below. <\/p>\n\n\n\n<p><strong>JumpServer<\/strong> <strong>Reset Password Vulnerability (CVS 2023-42820):<\/strong><\/p>\n\n\n\n<p>There is a password reset vulnerability in JumpServer, as third-party libraries expose random seed numbers to APIs, which may cause random verification codes to be replayed. Unauthenticated remote attackers can construct malicious requests to reset passwords.<\/p>\n\n\n\n<p>Reference connection: <a href=\"https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-7prv-g565-82qp\">https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-7prv-g565-82qp<\/a><\/p>\n\n\n\n<p><strong>JumpServer<\/strong> <strong>password reset brute force vulnerability<\/strong> <strong>(CVC-2023-43650):<\/strong> <strong><\/strong><\/p>\n\n\n\n<p>Due to the lack of rate limit for resetting user passwords, unauthenticated remote attackers can hijack non MFA accounts by requesting password reset and blasting the received 6-digit verification code (ranging from 000000 to 999999).<\/p>\n\n\n\n<p>Reference link: <a href=\"https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-mwx4-8fwc-2xvw\">https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-mwx4-8fwc-2xvw<\/a><\/p>\n\n\n\n<p><strong>JumpServer<\/strong> <strong>Arbitrary File Read<\/strong> <strong>Vulnerability (CVS 2023-42819):<\/strong> <strong><\/strong><\/p>\n\n\n\n<p>There is a remote code execution vulnerability in JumpServer, which allows remote attackers with low privileges to successfully log in and access the system, ultimately enabling the execution of arbitrary code or modification of arbitrary file content on the target system.<\/p>\n\n\n\n<p>Reference link: <a href=\"https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-ghg2-2whp-6m33\">https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-ghg2-2whp-6m33<\/a><\/p>\n\n\n\n<p><strong>Logical flaw vulnerability in JumpServer<\/strong> <strong>SSH<\/strong> <strong>public key<\/strong> <strong>authentication (CVS 2023-42818):<\/strong><\/p>\n\n\n\n<p>When a user enables MFA and uses a public key for authentication, the Koko SSH server will not verify the corresponding SSH private key. Attackers may exploit the vulnerability by attempting brute force authentication of SSH services using publicly available public keys.<\/p>\n\n\n\n<p>Reference link: https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-jv3c-27cv-w8jv<\/p>\n\n\n\n<p><strong>JumpServer<\/strong> <strong>SSH<\/strong> <strong>Public Key<\/strong> <strong>Creation Access<\/strong> <strong>Token<\/strong> <strong>Vulnerability<\/strong> <strong>(CVS 2023-43652)<\/strong><\/p>\n\n\n\n<p>JumpServer provides an API for the KoKoKo component to verify user private key login. This API does not verify the source of the request and will generate a personal authentication token. Given that public keys are easily leaked, attackers can use the leaked public key and username for authentication, and subsequently gain access to the current user information and authorization operations.<\/p>\n\n\n\n<p>Reference link: <a href=\"https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-fr8h-xh5x-r8g9\">https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-fr8h-xh5x-r8g9<\/a><\/p>\n\n\n\n<p><strong>JumpServer<\/strong> <strong>MongoDB<\/strong> <strong>Remote Code Execution Vulnerability (CVS 2023-43651):<\/strong> <strong><\/strong><\/p>\n\n\n\n<p>Authenticated users can exploit vulnerabilities in MongoDB sessions to execute arbitrary commands, and attackers who successfully exploit this vulnerability can gain root privileges on the target system, ultimately enabling remote code execution.<\/p>\n\n\n\n<p>Reference link: <a href=\"https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-4r5x-x283-wm96\">https:\/\/github.com\/jumpserver\/jumpserver\/security\/advisories\/GHSA-4r5x-x283-wm96<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected version <a><\/a><a><\/a><\/strong><\/p>\n\n\n\n<p><strong>CVE-2023-42820<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>2.24&lt;=JumpServer&lt;3.6.4<\/li>\n<\/ul>\n\n\n\n<p><strong>CVE-2023-43650\/CVE-2023-43652\/CVE-2023-43651<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>2.0.0&lt;=JumpServer&lt;2.28.19<\/li>\n\n\n\n<li>3.0.0&lt;=JumpServer&lt;3.7.0<\/li>\n<\/ul>\n\n\n\n<p><strong>CVE-2023-42819<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3.0.0&lt;=JumpServer&lt;3.6.4<\/li>\n<\/ul>\n\n\n\n<p><strong>CVE-2023-42818<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>JumpServer&lt;3.6.4<\/li>\n<\/ul>\n\n\n\n<p><strong>Unaffected version<\/strong><\/p>\n\n\n\n<p><strong>CVE-2023-42820<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>JumpServer&gt;=2.28.19<\/li>\n\n\n\n<li>JumpServer&gt;=3.6.5<\/li>\n<\/ul>\n\n\n\n<p><strong>CVE-2023-43650\/CVE-2023-43652\/CVE-2023-43651<\/strong> <strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>JumpServer&gt;=2.28.20<\/li>\n\n\n\n<li>JumpServer&gt;=3.7.1<\/li>\n<\/ul>\n\n\n\n<p><strong>CVE-2023-42819<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>JumpServer&gt;=3.6.5<\/li>\n<\/ul>\n\n\n\n<p><strong>CVE-2023-42818<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>JumpServer&gt;=3.6.5<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p>At present, the official has fixed this vulnerability in the latest version. Affected users are advised to upgrade the version as soon as possible:<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/jumpserver\/jumpserver\/releases\">https:\/\/github.com\/jumpserver\/jumpserver\/releases<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyberattacks. The company\u2019s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world\u2019s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA). A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, NSFOCUS CERT monitored that JumpServer officially issued a notice to fix multiple security vulnerabilities. The vulnerabilities are detailed below. JumpServer Reset Password Vulnerability (CVS 2023-42820): There is a password reset vulnerability in JumpServer, as third-party libraries expose random seed numbers to APIs, which may cause random verification codes to be replayed. Unauthenticated remote [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25819,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[],"class_list":["post-26437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>JumpServer Multiple Security Vulnerabilities Notification - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"JumpServer Multiple Security Vulnerabilities Notification - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, NSFOCUS CERT monitored that JumpServer officially issued a notice to fix multiple security vulnerabilities. The vulnerabilities are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-28T07:18:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/UEBA.png\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"JumpServer Multiple Security Vulnerabilities Notification - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, NSFOCUS CERT monitored that JumpServer officially issued a notice to fix multiple security vulnerabilities. The vulnerabilities are\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/UEBA.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"JumpServer Multiple Security Vulnerabilities Notification\",\"datePublished\":\"2023-09-28T07:18:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/\"},\"wordCount\":712,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/UEBA.png\",\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/\",\"name\":\"JumpServer Multiple Security Vulnerabilities Notification - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/UEBA.png\",\"datePublished\":\"2023-09-28T07:18:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/UEBA.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/UEBA.png\",\"width\":425,\"height\":224,\"caption\":\"Digital magnifying glass with UEBA text.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/jumpserver-multiple-security-vulnerabilities-notification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"JumpServer Multiple Security Vulnerabilities Notification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"JumpServer Multiple Security Vulnerabilities Notification - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/","og_locale":"pt_BR","og_type":"article","og_title":"JumpServer Multiple Security Vulnerabilities Notification - NSFOCUS","og_description":"Overview Recently, NSFOCUS CERT monitored that JumpServer officially issued a notice to fix multiple security vulnerabilities. The vulnerabilities are","og_url":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/","og_site_name":"NSFOCUS","article_published_time":"2023-09-28T07:18:47+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/UEBA.png","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"JumpServer Multiple Security Vulnerabilities Notification - NSFOCUS","twitter_description":"Overview Recently, NSFOCUS CERT monitored that JumpServer officially issued a notice to fix multiple security vulnerabilities. The vulnerabilities are","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/UEBA.png","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"JumpServer Multiple Security Vulnerabilities Notification","datePublished":"2023-09-28T07:18:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/"},"wordCount":712,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/UEBA.png","articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/","url":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/","name":"JumpServer Multiple Security Vulnerabilities Notification - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/UEBA.png","datePublished":"2023-09-28T07:18:47+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/UEBA.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/08\/UEBA.png","width":425,"height":224,"caption":"Digital magnifying glass with UEBA text."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/jumpserver-multiple-security-vulnerabilities-notification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"JumpServer Multiple Security Vulnerabilities Notification"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/26437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=26437"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/26437\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/25819"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=26437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=26437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=26437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}