First published: Fri Oct 30 2020(Updated: )
A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nextcloud Server | <19.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8236 is classified as a medium severity vulnerability due to its potential to mislead users about the security of the passwordless WebAuthn implementation.
To resolve CVE-2020-8236, upgrade Nextcloud Server to version 19.0.2 or later which addresses the misconfiguration.
The implications of CVE-2020-8236 include the possibility that users may incorrectly assume their passwordless authentication method is secure when it actually requires additional verification.
Users of Nextcloud Server versions prior to 19.0.2 are affected by CVE-2020-8236.
Yes, CVE-2020-8236 affects the user experience related to two-factor authentication by not properly verifying the WebAuthn PIN.