The Deluge Web-UI is vulnerable to XSS through a crafted torrent file. The the data from torrent files is not properly sanitised as it's interpreted directly as HTML. Someone who supplies the user with a malicious torrent file can execute arbitrary Javascript code in the context of the user's browser session.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://dev.deluge-torrent.org/ticket/3459 | issue tracking patch vendor advisory exploit |
https://groups.google.com/g/deluge-dev/c/e5zh7wT0rEg | issue tracking mailing list exploit third party advisory |
https://security.gentoo.org/glsa/202210-07 | third party advisory vendor advisory |