I’m Lovin’ It: Exploiting McDonald’s APIs to hijack deliveries and order food for a penny (eaton-works.com)
from Joker@sh.itjust.works to cybersecurity@infosec.pub on 19 Dec 22:20
https://sh.itjust.works/post/29737893

Key Points / Summary

> API flaws in the McDonald’s McDelivery system in India, one of the world’s most popular food delivery apps, enabled a variety of fun exploits: > > 🍟The ability to order any number of menu items for ₹1 ($0.01 USD). > > 🍟The ability to steal/hijack/redirect other people’s delivery orders through a specific sequence of carefully timed API calls. > > 🍟The ability to retrieve the details of any order. > > 🍟The ability to track any order in the “On the way” status. You could real-time track the location of the driver for any order. > > 🍟The ability to download invoices for any order. > > 🍟The ability to submit feedback for orders that are not your own. > > 🍟The ability to view admin KPI reports. > > 🍟Sensitive driver/rider information that could be accessed: > 🍔Name > > 🍔Email address > > 🍔Phone number > > 🍔Vehicle license plate number > > 🍔Profile picture

#cybersecurity

threaded - newest

rmtworks@lemmy.world on 19 Dec 22:49 next collapse

I’m glad the company took the report seriously. It is fun to see what kinds of stuff you can accomplish using these vulnerabilities!

dohpaz42@lemmy.world on 19 Dec 23:52 collapse

Does anybody know what tool this is?

<img alt="" src="https://eaton-works.com/cdn-cgi/imagedelivery/VwwCqBIYNXeyNQwEQ8uyVQ/00c23c2e-fdec-4e6a-7f3e-492898f10e00/full">

BillibusMaximus@sh.itjust.works on 20 Dec 00:04 collapse

Might be fiddler