
Cloud Vulnerability DB
A community-led vulnerabilities database
String::Compare::ConstantTime for Perl through version 0.321 contains a timing side-channel vulnerability that allows attackers to guess the length of a secret string. The vulnerability was discovered and disclosed in March 2024, identified as CVE-2024-13939. The affected component is the String::Compare::ConstantTime Perl module, which is designed to provide timing side-channel protected string comparison functionality (METACPAN, NVD).
The vulnerability exists in the equals function of the String::Compare::ConstantTime module. When comparing strings of different lengths, the function returns false immediately, which creates a timing discrepancy that can be measured by attackers. This behavior is explicitly documented in the module: "If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked." The vulnerability has been assigned a CVSS v3.1 score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (NVD).
The vulnerability allows attackers to determine the length of secret strings through timing analysis. While the content of the secret string remains protected, knowledge of the string length can significantly reduce the complexity of further attacks by narrowing down the search space for potential values (METACPAN).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."