A security analyst is reviewing the findings of the latest vulnerability report for a company’s web application. The web application accepts files for a Bash script to be processed if the files match a given hash. The analyst is able to submit files to the system due to a hash collision. Which of the following should the analyst suggest to mitigate the vulnerability with the fewest changes to the current script and infrastructure?
johnabayot
Highly Voted 1 year agomaggie22
Highly Voted 10 months, 2 weeks agobraveheart22
Most Recent 2 months, 2 weeks agothroughthefray
1 year, 4 months agoFoeMarc
1 year, 5 months agob0ad9e1
1 year, 4 months agob0ad9e1
1 year, 4 months agokmordalv
1 year, 7 months ago