CVE-2014-3664: Jenkins Path Traversal vulnerability
4
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.47935%
CWE
Published
5/17/2022
Updated
2/8/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:L/Au:S/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.main:jenkins-core | maven | >= 1.566, < 1.583 | 1.583 |
org.jenkins-ci.main:jenkins-core | maven | < 1.565.3 | 1.565.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves directory traversal through unspecified vectors (CVE-2014-3664) for authenticated users. Analysis of Jenkins' architecture indicates:
- Stapler framework's file serving methods (serveLocalizedFile) are primary candidates for path traversal flaws
- PluginServlet's resource handling is another common attack surface
- Security advisory specifically calls out 'files readable by Jenkins process' exposure
- Patched versions (1.583/LTS 1.565.3) would have added path normalization/sandboxing in these areas
- Historical Jenkins vulnerabilities (CVE-2014-3667) show similar patterns in plugin resource handling