A security team is conducting a vulnerability assessment on a web application and discovers that the application is vulnerable to a directory traversal attack. Which of the following is the BEST method to mitigate this vulnerability?
Modify file system permissions to restrict access.
Update the web application framework to the latest version.
Implement input validation to sanitize user-supplied data.
Disable directory listings on the server.