セキュリティ アナリストは、企業の Web アプリケーションに関する最新の脆弱性レポートの調査結果を検討しています。Web アプリケーションは、ファイルが指定されたハッシュと一致する場合に、Bash スクリプトの処理用のファイルを受け入れます。ハッシュの衝突により、アナリストはシステムにファイルを送信できます。現在のスクリプトとインフラストラクチャへの変更を最小限に抑えて脆弱性を軽減するには、アナリストは次のどれを提案すべきですか?
正解:B
The correct answer is B. Replace the current MD5 with SHA-256. The vulnerability that the security analyst is able to exploit is a hash collision, which is a situation where two different files produce the same hash value. Hash collisions can allow an attacker to bypass the integrity or authentication checks that rely on hash values, and submit malicious files to the system. The web application uses MD5, which is a hashing algorithm that is known to be vulnerable to hash collisions. Therefore, the analyst should suggest replacing the current MD5 with SHA-256, which is a more secure and collision-resistant hashing algorithm. The other options are not the best suggestions to mitigate the vulnerability with the fewest changes to the current script and infrastructure. Deploying a WAF (web application firewall) to the front of the application (A) may help protect the web application from some common attacks, but it may not prevent hash collisions or detect malicious files. Deploying an antivirus application on the hosting system may help scan and remove malicious files from the system, but it may not prevent hash collisions or block malicious files from being submitted. Replacing the MD5 with digital signatures (D) may help verify the authenticity and integrity of the files, but it may require significant changes to the current script and infrastructure, as digital signatures involve public-key cryptography and certificate authorities.