Website exploit allows spam to be sent from Google.com (with real headers)

Graham Cluley
Graham Cluley
@
@[email protected]
@gcluley

A 21-year-old Armenian calling himself “Vahe G” has uncovered a way of sending spam to Gmail users, just by them visiting an exploited webpage.

TechCrunch reports that they confirmed the vulnerability by visiting an affected page on Blogspot (Google’s own blogging platform) while logged into Gmail, and receiving an immediate email from Google’s servers. In other words, the headers were not forged.

In case you’re wondering – no, that definitely shouldn’t be possible.

Google vulnerability spam

Sign up to our free newsletter.
Security news, advice, and tips.

Although this particular exploit appears to have been set up for mischief, more malicious hackers could easily have exploited the vulnerability to spread the typical money-making spam we often see or to distribute malware or a phishing attack. Users might be much more likely to click on a link if they saw it really did come from Google, and could put their personal data in danger.

The good news is that now Google is aware of the issue, and says that it has rolled out a fix:

We quickly fixed the issue in the Google Apps Script API that could have allowed for emails to be sent to Gmail users without their permission if they visited a specially designed website while signed into their account. We immediately removed the site that demonstrated this issue, and disabled the functionality soon after. We encourage responsible disclosure of potential application security issues to [email protected].

Nevertheless, security issues like this are a real concern as more and more people rely upon email communications, and their webmail providers to deliver a reliable, filtered inbox. This was a serious security hole.

Image source: TechCrunch


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and is the co-host of the popular "Smashing Security" podcast. Follow him on Twitter, Mastodon, Threads, Bluesky, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.