CVE-2014-3666: Jenkins allows for Code Execution via Crafted Packet to the CLI
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.75534%
CWE
Published
5/17/2022
Updated
3/13/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jenkins-ci.main:jenkins-core | maven | >= 1.566, < 1.583 | 1.583 |
| org.jenkins-ci.main:jenkins-core | maven | < 1.565.3 | 1.565.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper channel termination in Jenkins' CLI handling. The commit patching CVE-2014-3666 changed these methods' access modifiers from protected to public, enabling proper override behavior from security-hardened remoting library (updated to v2.46). This allowed correct process termination on channel closure, preventing attackers from maintaining malicious connections. The direct correlation between these method visibility changes and the remoting library update in the security fix confirms their role in the vulnerability.