When checking the signature of an URI (an ESI fragment URL for instance), the URISigner did not used a constant time string comparison function, resulting in a potential remote timing attack vulnerability.
{
"cwe_ids": [
"CWE-203"
],
"nvd_published_at": "2019-11-21T23:15:13Z",
"github_reviewed_at": "2022-03-26T00:22:49Z",
"github_reviewed": true,
"severity": "HIGH"
}