{"id":9438,"date":"2019-10-16T02:32:48","date_gmt":"2019-10-16T02:32:48","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9438"},"modified":"2019-10-16T02:32:48","modified_gmt":"2019-10-16T02:32:48","slug":"harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/","title":{"rendered":"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert"},"content":{"rendered":"<h2><strong>Overview<\/strong><\/h2>\n<p>Harbor is an open-source project from VMware and an enterprise-class registry server that stores and distributes Docker container images. It adds some functionalities required by enterprises such as security, identity, and management.<!--more--><\/p>\n<p>Last week, a security researcher from Unit 42 disclosed a critical privilege escalation vulnerability in Harbor (CVE-2019-16097). By that time, the maintainers of Harbor had released a patch that fixes this vulnerability. Versions 1.7.6 and 1.8.3 include this fix.<\/p>\n<p>This vulnerability exists in core\/api\/user.go of Harbor, allowing remote non-administrative users to take over the Harbor repository by creating an administrator account upon addition of specified parameters to the POST \/api\/users API.<\/p>\n<p>On September 24, 2019, local time, VMware released a security advisory, announcing availability of workarounds for VMware Cloud Foundation and remediation for VMware Harbor Container Registry for PCF affected by this vulnerability. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8 (AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H).<\/p>\n<p>References:<\/p>\n<p><strong>[1] Unit 42 report<\/strong><\/p>\n<p><a href=\"https:\/\/unit42.paloaltonetworks.com\/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097\/\"><strong>https:\/\/unit42.paloaltonetworks.com\/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097\/<\/strong><\/a><\/p>\n<p><strong>[2] Harbor GitHub repository<\/strong><\/p>\n<p><strong>https:\/\/github.com\/goharbor\/harbor<\/strong><\/p>\n<p><strong>[3] VMware&#8217;s security advisory<\/strong><\/p>\n<p><a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2019-0015.html\"><strong>https:\/\/www.vmware.com\/security\/advisories\/VMSA-2019-0015.html<\/strong><\/a><\/p>\n<h2><strong>Affected Products and Versions<\/strong><\/h2>\n<ul>\n<li>Harbor Version &gt;= 1.7.0<\/li>\n<li>Harbor Version &lt;= 1.8.2<\/li>\n<li>VMware Harbor Container Registry for PCF 1.7.x &lt; 1.7.6<\/li>\n<li>VMware Harbor Container Registry for PCF 1.8.x &lt; 1.8.3<\/li>\n<\/ul>\n<h2><strong>Unaffected Products and Versions<\/strong><\/h2>\n<ul>\n<li>Harbor Version == 1.7.6<\/li>\n<li>Harbor Version == 1.8.3<\/li>\n<li>VMware Harbor Container Registry for PCF Version == 1.7.6<\/li>\n<li>VMware Harbor Container Registry for PCF Version == 1.8.3<\/li>\n<\/ul>\n<h2><strong>Security Recommendations<\/strong><\/h2>\n<p>The Harbor team and VMware both released the latest versions to fix the vulnerability in question. Users are advised to download them from the following addresses for immediate protection against this vulnerability.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"179\">Harbor v1.8.3<\/td>\n<td width=\"374\">https:\/\/github.com\/goharbor\/harbor\/releases\/tag\/v1.8.3<\/td>\n<\/tr>\n<tr>\n<td width=\"179\">Harbor v1.7.6<\/td>\n<td width=\"374\">https:\/\/github.com\/goharbor\/harbor\/releases\/tag\/v1.7.6<\/td>\n<\/tr>\n<tr>\n<td width=\"179\">VMware Harbor Container Registry for PCF 1.8.3<\/td>\n<td width=\"374\">https:\/\/network.pivotal.io\/products\/harbor-container-registry\/#\/releases\/470132<\/td>\n<\/tr>\n<tr>\n<td width=\"179\">VMware Harbor Container Registry for PCF 1.7.6<\/td>\n<td width=\"374\">https:\/\/network.pivotal.io\/products\/harbor-container-registry\/#\/releases\/470129<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The fix for VMware Cloud Foundation is to be created. Please visit the official website of VMware (https:\/\/www.vmware.com\/security\/advisories\/VMSA-2019-0015.html) for the latest information.<\/p>\n<p>Mitigation:<\/p>\n<p>System administrators can disable &#8220;allow self-registration&#8221; via the UI or API.<\/p>\n<ul>\n<li>UI: Configuration -&gt; Authentication -&gt; Allow Self-Registration (uncheck the check box)<\/li>\n<li>API: Use the configuration API to update self-registration.<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td width=\"553\">PUT \/api\/configurations<\/p>\n<p>{&#8220;self_registration&#8221;:false}<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong><br \/>\nStatement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n<p>A wholly owned subsidiary of NSFOCUS Information Technology Co. Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Harbor is an open-source project from VMware and an enterprise-class registry server that stores and distributes Docker container images. It adds some functionalities required by enterprises such as security, identity, and management.<\/p>\n","protected":false},"author":1,"featured_media":9439,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[444],"class_list":["post-9438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-harbor"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Harbor is an open-source project from VMware and an enterprise-class registry server that stores and distributes Docker container images. It adds\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-16T02:32:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/1016.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Harbor is an open-source project from VMware and an enterprise-class registry server that stores and distributes Docker container images. It adds\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/1016.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert\",\"datePublished\":\"2019-10-16T02:32:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/\"},\"wordCount\":636,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/1016.jpg\",\"keywords\":[\"Harbor\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/\",\"name\":\"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/1016.jpg\",\"datePublished\":\"2019-10-16T02:32:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/1016.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/1016.jpg\",\"width\":551,\"height\":336,\"caption\":\"Isometric lighthouse on purple background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert - NSFOCUS","og_description":"Overview Harbor is an open-source project from VMware and an enterprise-class registry server that stores and distributes Docker container images. It adds","og_url":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2019-10-16T02:32:48+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/1016.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert - NSFOCUS","twitter_description":"Overview Harbor is an open-source project from VMware and an enterprise-class registry server that stores and distributes Docker container images. It adds","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/1016.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert","datePublished":"2019-10-16T02:32:48+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/"},"wordCount":636,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/1016.jpg","keywords":["Harbor"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/","name":"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/1016.jpg","datePublished":"2019-10-16T02:32:48+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/1016.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/1016.jpg","width":551,"height":336,"caption":"Isometric lighthouse on purple background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/harbor-remote-privilege-escalation-vulnerability-cve-2019-16097-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Harbor Remote Privilege Escalation Vulnerability (CVE-2019-16097) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9438"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9438\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9439"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}