CSRF was discovered in the web UI in Deluge before 1.3.14. The exploitation methodology involves (1) hosting a crafted plugin that executes an arbitrary program from its init.py file and (2) causing the victim to download, install, and enable this plugin.
{
"binaries": [
{
"binary_name": "deluge",
"binary_version": "1.3.12-1ubuntu1"
},
{
"binary_name": "deluge-common",
"binary_version": "1.3.12-1ubuntu1"
},
{
"binary_name": "deluge-console",
"binary_version": "1.3.12-1ubuntu1"
},
{
"binary_name": "deluge-gtk",
"binary_version": "1.3.12-1ubuntu1"
},
{
"binary_name": "deluge-torrent",
"binary_version": "1.3.12-1ubuntu1"
},
{
"binary_name": "deluge-web",
"binary_version": "1.3.12-1ubuntu1"
},
{
"binary_name": "deluge-webui",
"binary_version": "1.3.12-1ubuntu1"
},
{
"binary_name": "deluged",
"binary_version": "1.3.12-1ubuntu1"
}
]
}