Monday, January 27, 2025
HomeBug BountyMcDonald’s Delivery App Bug Let Customers Orders For Just $0.01

McDonald’s Delivery App Bug Let Customers Orders For Just $0.01

Published on

SIEM as a Service

Follow Us on Google News

McDonald’s India (West & South) / Hardcastle Restaurants Pvt. Ltd. operates a custom McDelivery web app for ordering McDonald’s food for delivery, dine-in, and takeout. 

The app is popular, with over 10 million downloads on Google Play and #16 in Food & Drink on the Apple App Store and offers various options to choose from to get food.

Although the app had a security incident in 2017 leaking user data, there are no reports of similar incidents since.  

McDelivery homepage
McDelivery homepage

During an audit of the McDelivery website, a security researcher discovered a Broken Object Level Authorization (BOLA) vulnerability. 

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

By simply modifying the order ID in the “order-tracking” route, they were able to access sensitive order details of other users, including order status and location, without proper authentication, which occurred despite the presence of a JWT token generated from a guest login API call. 

They exploited the sequential nature of order IDs to easily enumerate and access information belonging to other customers, highlighting a critical security flaw in the application’s authorization mechanisms.

API calls was the JWT token.
API calls was the JWT token.

There are several vulnerabilities in the McDonald’s McDelivery app and by manipulating order IDs, they accessed sensitive data like driver information and customer invoices and even created accounts without phone number verification. 

They exploited undocumented APIs to retrieve data, generate invoices, and bypass the normal account creation process, which highlights potential risks to user privacy and data security within the McDelivery platform.

user/create API 
user/create API 

By exploiting this flaw, they were able to manipulate the price of items within their shopping cart, which was achieved by sending a malicious PUT request to the server, which allowed them to update the price field of individual items. 

Despite the server-side implementation of an RSA signature to prevent tampering with order details, the researcher circumvented this by modifying the item prices before the signature was generated. 

The successful exploitation demonstrated the criticality of proper input validation and authorization checks within application logic, highlighting potential risks associated with insufficiently restricted data modification capabilities.

payment processor
payment processor

According to Eat On Works, the researchers discovered multiple vulnerabilities in McDelivery that allowed unauthorized users to steal orders.

The attacker could change the address of an order placed by another user to their own address before the payment was confirmed. 

The attacker could also completely steal the order by changing the user ID of the order to their own account, while the author responsibly reported these vulnerabilities to McDelivery and received a bug bounty for their findings, and McDelivery fixed the vulnerabilities.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...