CVE-2014-3662: Jenkins Exposure of Sensitive Information to an Unauthorized Actor vulnerability
5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.19941%
CWE
Published
5/17/2022
Updated
2/8/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.main:jenkins-core | maven | >= 1.566, < 1.583 | 1.583 |
| org.jenkins-ci.main:jenkins-core | maven | < 1.565.3 | 1.565.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability (CVE-2014-3662/SECURITY-110) explicitly involves user enumeration via login response discrepancies. Jenkins' HudsonPrivateSecurityRealm is the primary class handling local user authentication. The doLogin method would be responsible for validating credentials, and pre-patch versions of this function likely leaked username existence through error message differentiation. The security advisory and CVE description align with this authentication flow vulnerability.