CVE-2019-10353 log

Severity High
Remote Yes
Type Cross-site request forgery
By default, CSRF tokens in Jenkins before 2.186 only checked user authentication and IP address. This allowed attackers able to obtain a CSRF token for another user to implement CSRF attacks as long as the victim’s IP address remained unchanged.
Group Package Affected Fixed Severity Status Ticket
AVG-1012 jenkins 2.185-1 2.186-1 High Fixed