December 19th, 2024

Exploiting McDonald's APIs to hijack deliveries and order food for a penny

A security researcher found multiple vulnerabilities in McDonald's McDelivery system in India, allowing unauthorized access to user orders and sensitive information, highlighting the need for improved security measures.

Read original articleLink Icon
Exploiting McDonald's APIs to hijack deliveries and order food for a penny

A security researcher discovered multiple vulnerabilities in McDonald's McDelivery system in India, allowing for significant exploits. These included the ability to order food for just ₹1 (approximately $0.01), hijack other users' delivery orders, access sensitive information such as driver details, and manipulate order invoices. The researcher identified flaws primarily related to Broken Object Level Authorization (BOLA) and Broken Object Property Level Authorization (BOPLA), which enabled unauthorized access to order details and the ability to alter prices during the checkout process. Despite McDonald's having a bug bounty program in India, the researcher noted that the system had not been adequately secured since a previous data leak in 2017. The vulnerabilities were exploited through a series of API calls, revealing that the system's design allowed for easy manipulation of order IDs and other parameters. The researcher ultimately created an account without verification and successfully placed an order at a manipulated price, highlighting the need for improved security measures in the application.

- McDonald's McDelivery system in India had significant API vulnerabilities.

- Users could order food for just ₹1 and hijack other users' orders.

- Sensitive driver information was accessible through the system.

- The researcher exploited flaws related to BOLA and BOPLA.

- The findings emphasize the need for enhanced security protocols in food delivery applications.

Link Icon 6 comments
By @bluetidepro - 29 days
All that work for ONLY a $240 Amazon gift card is absolutely wild to me. It still surprises me that people choose not exploit these things when these mega corporations basically award them pennies for finding major vulnerabilities like this.
By @EliRivers - 29 days
"September 29, 2024: I check the reported issues today and confirm they are all fixed."

This is the most amazing thing about this story. Not only did the company not threaten him, they actually fixed the issues.

By @beefnugs - 26 days
Next up : Drive thru ad-blocker. You enter your order into an app and at the drive thru it automatically plays a message that you are not using their fucking tracking points app, then reads your order, and forces the server to read it back to you and checks exactness, including checking the screen for another verification of correctness

poor workers yes... but fuck them just constantly adding more things to say and getting you to donate

By @foxyv - 28 days
Eating McDonalds is just too high a price in the first place. Adding a penny? Even worse.