CVE-2019-10353 log
Source |
|
Severity | High |
Remote | Yes |
Type | Cross-site request forgery |
Description | By default, CSRF tokens in Jenkins before 2.186 only checked user authentication and IP address. This allowed attackers able to obtain a CSRF token for another user to implement CSRF attacks as long as the victim’s IP address remained unchanged. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-1012 | jenkins | 2.185-1 | 2.186-1 | High | Fixed |
References |
---|
https://jenkins.io/security/advisory/2019-07-17/ |