When checking the signature of an URI (an ESI fragment URL for instance), the URISigner did not used a constant time string comparison function, resulting in a potential remote timing attack vulnerability.
{ "nvd_published_at": "2019-11-21T23:15:13Z", "cwe_ids": [ "CWE-203" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-03-26T00:22:49Z" }