{"uuid": "ba983383-c2eb-4abe-abe5-8da42e248cef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54147", "type": "seen", "source": "https://t.me/cvedetector/12438", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54147 - Altair GraphQL Client SSL/TLS Certificate Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-54147 \nPublished : Dec. 9, 2024, 7:15 p.m. | 44\u00a0minutes ago \nDescription : Altair is a GraphQL client for all platforms. Prior to version 8.0.5, Altair GraphQL Client's desktop app does not validate HTTPS certificates allowing a man-in-the-middle to intercept all requests. Any Altair users on untrusted networks (eg. public wifi, malicious DNS servers) may have all GraphQL request and response headers and bodies fully compromised including authorization tokens. The attack also allows obtaining full access to any signed-in Altair GraphQL Cloud account and replacing payment checkout pages with a malicious website. Version 8.0.5 fixes the issue. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T21:24:00.000000Z"}