CVE-2024-39069

7.8 HIGH

📋 TL;DR

This CVE describes a DLL hijacking vulnerability in ifood Order Manager v3.35.5 that allows attackers to execute arbitrary code by placing malicious DLLs in locations where the application searches for them. This affects users running the vulnerable version of ifood Order Manager on Windows systems. Attackers can gain code execution with the privileges of the user running the application.

💻 Affected Systems

Products:
  • ifood Order Manager
Versions: v3.35.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in 'Gestor de Peddios.exe' which appears to be the main executable. No special configuration needed for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data theft, ransomware deployment, or persistent backdoor installation on affected systems.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive order data, payment information, or business operations disruption.

🟢

If Mitigated

Limited impact if application runs with minimal privileges and proper file system permissions prevent DLL placement.

🌐 Internet-Facing: LOW - This appears to be a local attack requiring access to the target system's file system.
🏢 Internal Only: HIGH - Internal attackers or malware with local access can exploit this to escalate privileges and compromise systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking is a well-known attack vector with public proof-of-concept available. Requires local access to place malicious DLLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Check ifood vendor website for updates or contact vendor support.

🔧 Temporary Workarounds

Restrict DLL Search Path

windows

Use Windows policies or application settings to restrict where the application searches for DLLs

Set DLL search order using SetDllDirectory API or modify PATH environment variable

File System Permissions

windows

Restrict write permissions to directories where application searches for DLLs

icacls "C:\Program Files\ifood\" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Run application with minimal user privileges (not as administrator)
  • Implement application whitelisting to prevent execution of unauthorized DLLs

🔍 How to Verify

Check if Vulnerable:

Check if ifood Order Manager v3.35.5 is installed and examine DLL search behavior using Process Monitor

Check Version:

Check application properties or about dialog in ifood Order Manager

Verify Fix Applied:

Test if malicious DLLs placed in search paths are no longer loaded by the application

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Application errors related to missing or corrupted DLLs

Network Indicators:

  • Unusual outbound connections from ifood Order Manager process

SIEM Query:

Process Creation where Image contains 'Gestor de Peddios.exe' AND Parent Process is not expected

🔗 References

📤 Share & Export