Description
In the default configuration, after JBoss is installed, the JMX console is available at http://localhost:8080/jmx-console. The JMX console can be used to display the JNDI tree, dump the list of threads, redeploy an application or even shutdown the application server. By default, the console is not secured and can be used by remote attackers. Check References for detailed information.
It's possible to access the BSHDeployer MBean. The BSHDeployer MBean allows the deployment of BeanShell scripts. They are automatically executed once after installation.
Remediation
Restrict access to JMX Management Console.
References
Related Vulnerabilities
WordPress Plugin Jetpack-WP Security, Backup, Speed, & Growth Information Disclosure (9.7.1)
Atlassian Confluence information disclosure
WordPress 4.7.x Multiple Vulnerabilities (4.7 - 4.7.24)
Unrestricted access to NGINX+ Upstream HTTP interface
SugarCRM Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3803)