A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications.
Based on the audit, which recommendation should an engineer make for patching?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
Cross-site request forgery (CSRF) is a type of web application vulnerability that allows an attacker to execute unauthorized actions on behalf of a victim user on a web application. Given that a company has discovered CSRF vulnerabilities in 20 of its hosted applications during an internal audit, an engineer's primary recommendation should be to fix the vulnerabilities to prevent exploitation.
Option A suggests identifying the business applications running on the assets, which is a useful step for managing applications. However, it is not directly related to fixing the CSRF vulnerabilities. Therefore, this option is not the best recommendation for patching.
Option B suggests updating software to patch third-party software. It is a good security practice to keep all software up-to-date to ensure that known vulnerabilities are patched. However, it is not clear if third-party software is the cause of the CSRF vulnerabilities in the company's hosted applications. Therefore, this option may not be the best recommendation for patching the vulnerabilities.
Option C suggests validating CSRF by executing exploits within Metasploit. While it is a good practice to validate vulnerabilities, it is not the best recommendation for patching. In this case, the vulnerabilities have already been identified during an internal audit, and the primary objective should be to fix them.
Option D suggests fixing applications according to the risk scores. This option is the best recommendation for patching the CSRF vulnerabilities. Risk scores can help prioritize which applications to fix first based on the severity of the vulnerability and the potential impact on the business. The engineer should work with the development team to fix the vulnerabilities in the hosted applications as soon as possible to mitigate the risk of exploitation.