Re-Post : How I managed to gain access to The Indian Digital treasure – 3 Billion documents on Digilocker

 Hi Guys,

This is a repost of the blog that was written on as the yas portal is facing technical issues everynow and then. Also apologies for the bad quality of screen shots, i will find old files and update it later.

During the beginning of May 2020, there was a large commotion about the arogyasetu app and its security after a so called “hack” by infamous political hacker named Elliot Alderson. In light of all this, we at the YAS (Yet Another Security) community, had some talks in our WhatsApp group. So, it turned out to be a discussion on techniques used for bypassing SSL pinning on the mobile apps. This whole discussion made be curious about other apps from India government and since I have worked on similar projects outside of India, digilocker caught my attention.

Hence, I downloaded the app and installed on my test devices and fired up my favorite toolset burpsuite + Frida. I used my homebrewed pinning bypass scripts to actively intercept the app’s communication with the backend. To my surprise, I found that digilocker was not matching with the basic security features of arogyasetu, such as custom root detection, custom ssl pinning checks all wrapped inside obfuscated binary.

That made it interesting, I decided to dig in, as I was not current user of the platform it asked me to signup first and setup a pin to access the system. The immediate thing that caught my eye on the request to set pin was it was a normal http request with no session, in layman’s terms, the platform allows an anonymous user to set pin for any active user of the platform. Shocking!!!

To give more technical context, internally the system denotes each user with a unique v5 UUID (v5 denotes it has enough entropy and that there is less chance of duplication and has enough randomness to it), so to set a new pin for the user all you need is to call the endpoint with uuid and new pin value.

All of this made me think about how to bypass sms otp of a user, because pin is asked after the OTP. So by looking at how the communication progresses between mobile app and backend server I came to conclusion that the steps of verifying sms otp and submitting pin are not linked together. Meaning you can do the sms otp as one user and submit pin of second user and finally you will end up logging in as second user. Bingo!!!

I figured all this by looking at the mobile app of digilocker, wait a minute there is a web portal for digilocker. I started to look at the web portal of digilocker, this then gave me more internal knowledge on the mobile app.  Here are some observations that I sent to CERT-IN and digilocker teams.


May 10th – I reported this to CERT-IN
May 14th – CERT-IN finally acknowledged the issue
May 28th – CERT-IN confirmed the issues are fixed
June 3rd – I saw another blog with similar findings and decided to write one of my own.


Dedicated to all 215 members who are my hardcore brothers & sisters from YAS community. Thanks for all your support and inspiration to do this.

Detailed observations

Below is a summary of the findings that i found, I just gave risk rating based on industry standards for each.

1) OTP bypass due to lack of authorization – Critical

The OTP function lacks authorization which makes it possible to perform OTP validation with submitting any valid users details and then manipulation flow to sign in as totally different user. Let’s assume attacker creates/gets hold of a valid dummy account.

Attack path

  1. Use any valid account attacker has access to and complete otp
  2. Proceed with pin submission to totally different victim account
  3. Logs into victim account

Below is attack steps

  1. Attacker uses a valid user account that he has access and starts the login process by submitting phone number.
  2. Attacker completes the OTP validation with account (mobile number) he possesses.
  3. Attacker proceeds to submit the secret pin

Sample screen shot of login call, similar calls can be observed to all above mentioned urls.

2) Secret PIN Bypass/takeover – Critical

The pin setting API/URL lacks any authorization and can be used to reset pin of any user without authentication.

Attack path

  1. Attacker finds the uuid of a user or randomly picks one
  2. Attacker sets the pin via the url
  3. Attacker uses vulnerability #1 mentioned above to gain access to the account

Below is attack steps

  1. Attacker submits the uuid of the user and new pin to the url
  2. Pin gets updated

Sample screenshot of the call. Notice there is no session related information on the POST request so its not bound to any user

3) Poor session mechanism in APIs – High

It was observed that the API calls from mobile were using basic authentication to fetch data or do transactions. All calls from mobile has a header flag is_encrypted: 1 which denotes that the user has to submit the credentials (user_uuid:secret_pin) in basic auth format encrypted with Algorithm: AES/CBC/PKCS5Padding with key We4c4HYS5eagYdshfEP2KY27KwkjaZNH

However it was found that the same api can be accessed with removing the is_encrypted: 1 flag and then submitting the credentials in basic auth format (user_uuid:secret_pin)

Attack path

  1. Use vulnerability #2 to set and takeover pin of any user
  2. Call the api directly as described above to access function or data directly

Sample call from mobile app

Sample call removing the header flag and using unencrypted credentials

Output of Custom script to monitor crypto functions in the mobile app

4) Weak SSL pinning mechanism in mobile app – Medium

The app uses weak ssl pinning it can be bypass easily with tools like Frida and known techniques.

Acknowledgement from CERT-In

Confirmation on fix


  1. This comment has been removed by the author.

  2. Unlocking the digital treasure was a journey, and I couldn't have done it without the right tools. Just as a treasure map guides you, expertly crafted Online assignment writing services .were my compass in the academic maze. They provided me with the insights and support needed to navigate and succeed.


  3. Caring for your motorcycle helmet includes cleaning, proper storage, and adhering to the manufacturer's instructions. Regular inspections are vital, and you should replace your helmet every five years or after accidents. Look at this web-site Helmet Price in Bangladesh.

  4. I am pleased to have come across this subject, but I do not have any detailed information about it at the moment. I would like to mention an important point regarding OTHM Assignment Writers UK, I also discuss assignments and the difficulties students encounter when they do not have a sufficient understanding of their assignments and dissertations.

  5. pg game slot pocket games ได้ก้าวขึ้นมาเป็นหนึ่งในนวัตกรรมที่น่าติดตามในโลกของเกมสล็อตออนไลน์ pg slot เกมนี้ไม่เพียงทำให้ผู้เล่นตื่นเต้นและสนุกสนาน กราฟิกที่ทันสมัยและความคล่องตัว

  6. I have learned alot of things in this blog. This is really helpful and informative for me.If you are looking to buy the best online obu thesis service turnout to the thesis writing help for all the academic task.


Post a Comment