You have 0 free articles left this month.
Register for a free account to access unlimited free content.
Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

For breaking news and daily updates, subscribe to our newsletter.
Advertisement

Not lovin’ it: McDonald’s hiring back end exposes 64m chatbot job discussions

Researchers were able to access the hiring chatbot’s back end after finding it was protected by a default password: “123456”.

Not lovin' it: McDonalds hiring backend exposes 64m chatbot job discussions
expand image

Infosec researchers have discovered a critical security flaw in McDonald’s hiring process after using a default password to access the admin side of its hiring chatbot platform.

Security researchers Ian Carroll and Sam Curry published their findings after they were able to access the administrator page of the fast-food chain’s McHire platform, exposing 64 million hiring chats.

McHire uses a chatbot created by Paradox.ai called Olivia, which collects the personal information and shift preferences from potential job candidates, as well as administers personality tests. However, after seeing a number of Reddit users report the bot responding strangely, Carroll and Curry began investigating.

 
 

The two began by applying for a job through the McHire platform, where they were quickly directed to Olivia. While the researchers found the personality test “disturbing” after asking if they liked overtime, they were unable to make any progress.

However, they discovered that the McHire platform for restaurant owners also allowed for Parados team members to log in. The two attempted using 123456 as login credentials and soon found themselves logged in as the administrator of a test restaurant, where the employees were Paradox.ai staff.

“During a cursory security review of a few hours, we identified two serious issues: the McHire administration interface for restaurant owners accepted the default credentials [123456:123456], and an insecure direct object reference (IDOR) on an internal API allowed us to access any contacts and chats we wanted,” the pair said.

“Together, they allowed us and anyone else with a McHire account and access to any inbox to retrieve the personal data of more than 64 million applicants.”

This data included the name, email, phone number, and address of each applicant, as well as the candidacy state and every state change and form input of the candidate, such as their shift availability, and their raw chat messages.

Upon discovering the flaw, the researchers disclosed it to both McDonald’s and Paradox.ai, but they had to email “random people” as there were no disclosure contacts.

“The Paradox.ai security page just says that we do not have to worry about security,” the two added.

Once the disclosure reached Paradox.ai, the issue was patched, and the company “committed to further reviews to identify and close any remaining avenues of exploitation”.

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.