header bg

Scan QR code or get instant email to install app

Question:

Clara has been informed of a zero-day vulnerability in a web application. She has exploited code, including an active SQL injection attack. If she needs the application to remain operational, what can she do to respond quickly and prevent the problem from affecting her environment?

A Deploy a fix via her WAF.
explanation

The best solution for Clara is to utilize her web application firewall (WAF) to detect and patch the SQL injection attempt. Intrusion detection systems (IDS) can only identify attacks but cannot prevent them. Reverse engineering and manually updating the application code can be time-consuming, and she may not have access to the source code or the ability to modify it. Lastly, vendor patches for zero-day vulnerabilities usually take some time to become available, even in the best-case scenario, implying that Clara may have to wait for a patch for a prolonged period if she selects that option.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*