CSRF was discovered in the web UI in Deluge before 1.3.14. The exploitation methodology involves (1) hosting a crafted plugin that executes an arbitrary program from its init.py file and (2) causing the victim to download, install, and enable this plugin.
{ "binaries": [ { "binary_version": "1.3.12-1ubuntu1", "binary_name": "deluge" }, { "binary_version": "1.3.12-1ubuntu1", "binary_name": "deluge-common" }, { "binary_version": "1.3.12-1ubuntu1", "binary_name": "deluge-console" }, { "binary_version": "1.3.12-1ubuntu1", "binary_name": "deluge-gtk" }, { "binary_version": "1.3.12-1ubuntu1", "binary_name": "deluge-torrent" }, { "binary_version": "1.3.12-1ubuntu1", "binary_name": "deluge-web" }, { "binary_version": "1.3.12-1ubuntu1", "binary_name": "deluge-webui" }, { "binary_version": "1.3.12-1ubuntu1", "binary_name": "deluged" } ] }