Using the /v1/brands/lookupkey/brand/[brand_id] endpoint on the API, its possible to request information about any brand, without any authentication.

Since the brand_id is normally the same as the project_number, only the project_number is needed to exploit this vulnerability. The project_number can leak from an API key when sending a request with the key to an API that’s not enabled on the key’s project.

The endpoint even returns brands that are Google Workspace internal. ("isOrgInternal": true)

Normally, even if you have the client_id, trying to start an OAuth flow on a Workspace internal brand as an outsider only returns a Error 403: org_internal This client is restricted to users within its organization. error, and doesn’t leak any information about the brand’s name, or other details. So those details are clearly considered private, but this endpoint leaks them.

Core Issue:

There is no access control on the /v1/brands/lookupkey/brand/[brand_id] endpoint.
It should require read permissions on the brand’s project. This is even stated in the API’s Discovery Document:

Retrieve branding info given a brand_id.
Requires read permission on the associated project.

Steps to reproduce:

  1. Create a GCP project, and note the project’s project_number
  2. Go to and set up a consent screen (brand)
  3. Send this unauthenticated GET request (the API key is from Cloud Console):
GET /v1/brands/lookupkey/brand/[project_number]?readMask=*&%24outputDefaults=true HTTP/1.1
X-Goog-Api-Key: AIzaSyCI-zsRP85UVOi0DjtiCwWBwQ1djDy741g

  1. See the brand object returned in the response

Attack scenario:

Any unauthenticated attacker who knows the target project’s project_number. As I stated above, the project_number can leak from a publicly exposed API key when sending a request with the key to an API that’s not enabled on the key’s project.


Vendor - 2021-04-09 19:06

NOTE: This e-mail has been generated automatically.

Thanks for your report.

This email confirms we’ve received your message. We’ll investigate and get back to you once we’ve got an update. In the meantime, you might want to take a look at the list of frequently asked questions about Google VRP.

If you are reporting a security vulnerability and wish to appear in Google Security Hall of Fame, please create a profile.

You appear automatically in our Honorable Mentions if we decide to file a security vulnerability based on your report, and you will also show up in our Hall of Fame if we issue a reward.

Note that if you did not report a vulnerability, or a technical security problem in one of our products, we won’t be able to act on your report. This channel is not the right one if you wish to resolve a problem with your account, report non-security bugs, or suggest a new feature in our product.

Google Security Bot

Follow us on Twitter!

Vendor - 2021-04-12 09:16

NOTE: This e-mail has been generated automatically.


Just letting you know that your report was triaged and we’re currently looking into it.

You should receive a response in a couple of days, but it might take up to a week if we’re particularly busy. In the meantime, you might want to take a look at the list of frequently asked questions about Google VRP.

Google Security Bot

Vendor - 2021-04-13 16:53


🎉 Nice catch! I’ve filed a bug based on your report.

The panel will evaluate it at the next VRP panel meeting and we’ll update you once we’ve got more information. All you need to do now is wait. If you don’t hear back from us in 2-3 weeks or have additional information about the vulnerability, let us know!

[redacted], Google Security Team

Vendor - 2021-04-22 21:20

** NOTE: This is an automatically generated email **


We have notified the team about this issue; they will review your report and decide whether they want to make a change or not. Thanks for letting us know.

Regarding our Vulnerability Reward Program, the panel decided this issue’s security impact does not meet the criteria to qualify for a reward in the program, so we won’t be issuing a reward at this time.

Regards, Google Security Bot

– How did we do? Please fill out a short anonymous survey (

Vendor - 2021-06-10 23:44

NOTE: This is an automatically generated email


Our systems show that the bug we created based on your report has been closed without providing a fix.

This may have happened for various reasons: the risk impact might be too small to warrant a fix, there might be other mitigating factors, or simply the product is not maintained anymore.

The exact status is INTENDED_BEHAVIOR. This decision has been made by the relevant product teams and does not affect your VRP reward amount or Hall of Fame position.

We can’t provide more details in this automated notification, but we’ll be happy to answer your questions regarding this decision.

Google Security Bot

Me - 2021-06-18 17:17


Just a heads up, this report will be disclosed in 20 days, on 2021-07-08.

Is this really intended behaviour? I think the documentation states somewhere that org internal clients are not visible to anyone outside the org. Trying to log in to an org internal client with OAuth also throws an error without providing any information (like name, email address), but this bug leaks those details.

Thank you,

Vendor - 2021-06-21 22:14


The product team thinks that this information is public. The info is also available through other sources. If someone can construct the authorization URL using the client-id and redirect URI, they would be able to get part of this data on the consent screen (eg. app name, privacy policy, etc.).

Why do you think that the info should be private? If you can find it, can you give a link to the documentation that mentions that internal clients aren’t visible?