Thursday, February 27, 2025
HomeBug BountyMcDonald’s Delivery App Bug Let Customers Orders For Just $0.01

McDonald’s Delivery App Bug Let Customers Orders For Just $0.01

Published on

SIEM as a Service

Follow Us on Google News

McDonald’s India (West & South) / Hardcastle Restaurants Pvt. Ltd. operates a custom McDelivery web app for ordering McDonald’s food for delivery, dine-in, and takeout. 

The app is popular, with over 10 million downloads on Google Play and #16 in Food & Drink on the Apple App Store and offers various options to choose from to get food.

Although the app had a security incident in 2017 leaking user data, there are no reports of similar incidents since.  

McDelivery homepage
McDelivery homepage

During an audit of the McDelivery website, a security researcher discovered a Broken Object Level Authorization (BOLA) vulnerability. 

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

By simply modifying the order ID in the “order-tracking” route, they were able to access sensitive order details of other users, including order status and location, without proper authentication, which occurred despite the presence of a JWT token generated from a guest login API call. 

They exploited the sequential nature of order IDs to easily enumerate and access information belonging to other customers, highlighting a critical security flaw in the application’s authorization mechanisms.

API calls was the JWT token.
API calls was the JWT token.

There are several vulnerabilities in the McDonald’s McDelivery app and by manipulating order IDs, they accessed sensitive data like driver information and customer invoices and even created accounts without phone number verification. 

They exploited undocumented APIs to retrieve data, generate invoices, and bypass the normal account creation process, which highlights potential risks to user privacy and data security within the McDelivery platform.

user/create API 
user/create API 

By exploiting this flaw, they were able to manipulate the price of items within their shopping cart, which was achieved by sending a malicious PUT request to the server, which allowed them to update the price field of individual items. 

Despite the server-side implementation of an RSA signature to prevent tampering with order details, the researcher circumvented this by modifying the item prices before the signature was generated. 

The successful exploitation demonstrated the criticality of proper input validation and authorization checks within application logic, highlighting potential risks associated with insufficiently restricted data modification capabilities.

payment processor
payment processor

According to Eat On Works, the researchers discovered multiple vulnerabilities in McDelivery that allowed unauthorized users to steal orders.

The attacker could change the address of an order placed by another user to their own address before the payment was confirmed. 

The attacker could also completely steal the order by changing the user ID of the order to their own account, while the author responsibly reported these vulnerabilities to McDelivery and received a bug bounty for their findings, and McDelivery fixed the vulnerabilities.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...