CSRF was discovered in the web UI in Deluge before 1.3.14. The exploitation methodology involves (1) hosting a crafted plugin that executes an arbitrary program from its init.py file and (2) causing the victim to download, install, and enable this plugin.
{
"binaries": [
{
"binary_version": "1.3.12-1ubuntu1",
"binary_name": "deluge"
},
{
"binary_version": "1.3.12-1ubuntu1",
"binary_name": "deluge-common"
},
{
"binary_version": "1.3.12-1ubuntu1",
"binary_name": "deluge-console"
},
{
"binary_version": "1.3.12-1ubuntu1",
"binary_name": "deluge-gtk"
},
{
"binary_version": "1.3.12-1ubuntu1",
"binary_name": "deluge-torrent"
},
{
"binary_version": "1.3.12-1ubuntu1",
"binary_name": "deluge-web"
},
{
"binary_version": "1.3.12-1ubuntu1",
"binary_name": "deluge-webui"
},
{
"binary_version": "1.3.12-1ubuntu1",
"binary_name": "deluged"
}
]
}