{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T13:49:42.473","vulnerabilities":[{"cve":{"id":"CVE-2024-54147","sourceIdentifier":"security-advisories@github.com","published":"2024-12-09T19:15:14.513","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Altair is a GraphQL client for all platforms. Prior to version 8.0.5, Altair GraphQL Client's desktop app does not validate HTTPS certificates allowing a man-in-the-middle to intercept all requests. Any Altair users on untrusted networks (eg. public wifi, malicious DNS servers) may have all GraphQL request and response headers and bodies fully compromised including authorization tokens. The attack also allows obtaining full access to any signed-in Altair GraphQL Cloud account and replacing payment checkout pages with a malicious website. Version 8.0.5 fixes the issue."},{"lang":"es","value":"Altair es un cliente GraphQL para todas las plataformas. Antes de la versión 8.0.5, la aplicación de escritorio de Altair GraphQL Client no valida los certificados HTTPS, lo que permite que un intermediario intercepte todas las solicitudes. Cualquier usuario de Altair que se encuentre en redes que no sean de confianza (por ejemplo, wifi pública, servidores DNS maliciosos) puede ver todos los encabezados y cuerpos de las solicitudes y respuestas de GraphQL completamente comprometidos, incluidos los tokens de autorización. El ataque también permite obtener acceso completo a cualquier cuenta de Altair GraphQL Cloud en la que se haya iniciado sesión y reemplazar las páginas de pago con un sitio web malicioso. La versión 8.0.5 soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-295"}]}],"references":[{"url":"https://github.com/altair-graphql/altair/blob/004f645d1cae032787fccf7166dc193b775e9660/packages/altair-electron/src/app/index.ts#L162-L170","source":"security-advisories@github.com"},{"url":"https://github.com/altair-graphql/altair/security/advisories/GHSA-8v9h-hxp5-9jcx","source":"security-advisories@github.com"}]}}]}