{"uuid": "b22a4222-c16f-4cbf-86d2-834f802c3a65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40611", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19436", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-40611\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows\u00a0authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.\n\nUsers should upgrade to version 2.7.1 or later which has removed the vulnerability.\n\ud83d\udccf Published: 2023-09-12T11:05:22.841Z\n\ud83d\udccf Modified: 2025-06-25T13:39:24.245Z\n\ud83d\udd17 References:\n1. https://github.com/apache/airflow/pull/33413\n2. https://lists.apache.org/thread/8y9xk1s3j4qr36yzqn8ogbn9fl7pxrn0\n3. http://www.openwall.com/lists/oss-security/2023/11/12/1", "creation_timestamp": "2025-06-25T13:50:46.000000Z"}