CVE-2019-10353 log

Source
Severity High
Remote Yes
Type Cross-site request forgery
Description
By default, CSRF tokens in Jenkins before 2.186 only checked user authentication and IP address. This allowed attackers able to obtain a CSRF token for another user to implement CSRF attacks as long as the victim’s IP address remained unchanged.
Group Package Affected Fixed Severity Status Ticket
AVG-1012 jenkins 2.185-1 2.186-1 High Fixed
References
https://jenkins.io/security/advisory/2019-07-17/