CVE-2024-54147

6.8 MEDIUM

📋 TL;DR

Altair GraphQL Client desktop app versions before 8.0.5 fail to validate HTTPS certificates, allowing man-in-the-middle attackers to intercept all GraphQL requests and responses. This exposes sensitive data including authorization tokens and can compromise Altair GraphQL Cloud accounts. Users on untrusted networks like public WiFi are particularly vulnerable.

💻 Affected Systems

Products:
  • Altair GraphQL Client desktop application
Versions: All versions prior to 8.0.5
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the desktop/Electron version, not web or browser extensions. Vulnerability exists in default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all GraphQL communications, theft of authentication tokens, unauthorized access to Altair Cloud accounts, and financial fraud through payment page redirection.

🟠

Likely Case

Interception of GraphQL queries/responses containing sensitive data and authentication tokens when users connect via untrusted networks.

🟢

If Mitigated

Limited exposure if users only connect via trusted networks with proper certificate validation elsewhere in the stack.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires man-in-the-middle position on network, which is trivial on public/unsecured networks. No authentication needed to intercept traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.5

Vendor Advisory: https://github.com/altair-graphql/altair/security/advisories/GHSA-8v9h-hxp5-9jcx

Restart Required: Yes

Instructions:

1. Open Altair GraphQL Client. 2. Check for updates in settings or help menu. 3. Download and install version 8.0.5 or later. 4. Restart the application.

🔧 Temporary Workarounds

Use browser version

all

Use Altair's web version instead of desktop app

Network restrictions

all

Only use Altair on trusted, secure networks with proper certificate validation

🧯 If You Can't Patch

  • Discontinue use of Altair desktop app for sensitive GraphQL operations
  • Use VPN when connecting from untrusted networks to encrypt traffic

🔍 How to Verify

Check if Vulnerable:

Check Altair version in Help > About or settings. If version is below 8.0.5, you are vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Confirm version is 8.0.5 or higher in application settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual certificate validation failures
  • Unexpected network traffic patterns from Altair

Network Indicators:

  • Unencrypted GraphQL traffic from Altair client
  • Certificate validation bypass attempts

SIEM Query:

Not applicable - client-side vulnerability

🔗 References

📤 Share & Export