CVE-2020-13404

8.8 HIGH

📋 TL;DR

This vulnerability allows remote command injection in the ATOS/Sips payment module for Magento. Attackers can execute arbitrary system commands on servers running vulnerable versions, potentially compromising the entire Magento installation. Affected systems are those using ATOS/Sips module versions 3.0.0 through 3.0.5.

💻 Affected Systems

Products:
  • ATOS/Sips (Atos-Magento) community module for Magento
Versions: 3.0.0 to 3.0.5
Operating Systems: Any OS running Magento with the vulnerable module
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the ATOS/Sips module to be installed and enabled in Magento.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or use as a foothold for lateral movement within the network.

🟠

Likely Case

Unauthorized command execution allowing data exfiltration, backdoor installation, or disruption of payment processing.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available from security researchers. Command injection via module parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.6 or later

Vendor Advisory: https://github.com/quadra-informatique/Atos-Magento/releases

Restart Required: No

Instructions:

1. Download version 3.0.6+ from GitHub releases. 2. Replace the existing ATOS/Sips module files. 3. Clear Magento cache. 4. Test payment functionality.

🔧 Temporary Workarounds

Disable ATOS/Sips Module

linux

Temporarily disable the vulnerable module until patching is possible.

php bin/magento module:disable Quadra_Informatique_Atos

Input Validation WAF Rule

all

Implement web application firewall rules to block suspicious command injection patterns in ATOS/Sips requests.

🧯 If You Can't Patch

  • Network segmentation to isolate Magento servers from critical infrastructure
  • Implement strict egress filtering to limit outbound connections from Magento servers

🔍 How to Verify

Check if Vulnerable:

Check the module version in app/code/Quadra/Informatique/Atos/etc/module.xml or via Magento admin panel.

Check Version:

grep -i version app/code/Quadra/Informatique/Atos/etc/module.xml

Verify Fix Applied:

Confirm module version is 3.0.6 or higher and test payment functionality works without errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual system commands in Magento or web server logs
  • ATOS/Sips module requests with shell metacharacters

Network Indicators:

  • Outbound connections from Magento server to unexpected destinations
  • Unusual process execution patterns

SIEM Query:

source="magento.log" AND "ATOS" AND ("|" OR ";" OR "$" OR "`")

🔗 References

📤 Share & Export