Mail Information Gathering Appscript Paper 1
Mail Information Gathering Appscript Paper 1
APPSCRIPT
BY
NOVEMBER 2021
Content
Introduction ........................................................................... 1
Deployment............................................................................ 1
Deployment ......................................................................... 3
Phishing ................................................................................. 4
Exploitation ............................................................................ 8
Mitigation .............................................................................. 10
Introduction
This paper contains the exploitation of vulnerabilities for collecting email
information using Google utilities via App Script using the Gmail App class. This
paper exposes the design of a web application that collects mail information
from users with associated Google mail accounts.
Deployment
Web Application
The application containing the exploit code is developed with App Script using
a web application that is deployed on Google's free servers for Gmail accounts.
For the above it is necessary to have a file with the main page (Figure 1) the
utilities for the collection of mail information (Figure 2) and for the storage of
the information in Google sheets (Figure 3 and 4).
Figure 1. Index.html
1
Figure 2. Utilities.gs
Figure 3. Mail.gs
2
Figure 4. Mail Gathering Google Sheet
Deployment
To run the application correctly it is necessary to deploy the application using
the options Execute the app as: User accessing the web app and Who has access
to the app: Anyone (Figure 5).
Figure 5. Deployment
3
The web application should be displayed as follows:
Figure 6. WebApp
Phishing
To access the victim's information, it is necessary a Phishing mechanism, for
which an email with the access link and an attractive message with an offer
(Figure 7) can be sent to the victim (Figure 8 and 9).
4
Figure 8. Phishing Mail in Inbox Google Mail (Victim user)
When the victim accesses the application for the first time, it is necessary to
accept the access permissions to the application, for which the permissions
review window appears (Figure 10), it is requested to select the access account
(Figure 11), an application not verified message appears (Figure 12), then a list
of the services or functions of the application is displayed (Figure 13).
5
Figure 10. Grant permissions (Victim user)
6
Figure 12. Go site -no safe mode- (Victim user)
7
Figure 14. Notification (Victim user)
Exploitation
Exploitation is performed automatically with the execution of the event defined
in the application, in this case the extraction of the e-mail information will be
performed with the execution of the "Click and get a surprise" button (Figure
15 and 16).
8
Figure 16. Click button (Victim user)
When the victim user executes the function, the information of the emails is
stored in the Google sheet previously defined by the attacker (Figure 17). In this
case only the subject was extracted, however it is possible to access all the
content and identification information of the emails.
9
Mitigation
To mitigate this vulnerability through Google applications it is necessary to only
allow access to those applications of users that you know perfectly well,
preferably only accept applications that are in an authorized domain within a
company, otherwise the function to extract information can be executed with
any event of the browser, even with the start of opening the page of the site.
10