VYPR
Critical severityNVD Advisory· Published Apr 10, 2023· Updated Oct 17, 2024

Apache Linkis gateway module token authentication bypass

CVE-2023-27987

Description

In Apache Linkis <=1.3.1, due to the default token generated by Linkis Gateway deployment being too simple, it is easy for attackers to obtain the default token for the attack. Generation rules should add random values.

We recommend users upgrade the version of Linkis to version 1.3.2 And modify the default token value. You can refer to Token authorization[1] https://linkis.apache.org/docs/latest/auth/token https://linkis.apache.org/docs/latest/auth/token

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In Apache Linkis <=1.3.1, the default token generated by Gateway is too simple, allowing attackers to bypass authentication.

Vulnerability

Description

In Apache Linkis versions up to and including 1.3.1, the default token generated by the Gateway deployment uses a predictable generation rule without sufficient randomness [1][2]. This makes it easy for attackers to guess or obtain the default token, bypassing the intended token authentication mechanism [4].

Exploitation

An attacker can exploit this by sending HTTP requests to the Linkis Gateway with the guessed default token in the Token-Code header or cookie [3]. No prior authentication or special network position is required, as the Gateway is typically exposed to external networks. The token is static by default, allowing repeated use until changed [4].

Impact

Successful exploitation grants the attacker unauthorized access to the Linkis Gateway, enabling them to submit jobs to underlying data engines (e.g., Spark, Hive) and potentially access sensitive data or execute arbitrary commands within the context of the token's configured user [1][2].

Mitigation

The issue is addressed in Apache Linkis version 1.3.2, which enforces random token generation [2][4]. Users are strongly advised to upgrade to 1.3.2 and also manually modify the default token value. Refer to the token authorization documentation for configuration guidance [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.linkis:linkisMaven
< 1.3.21.3.2

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.