BeanShell Remote Server Mode Arbitrary Code Execution

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

A shell is listening on the remote host.

Description :

The remote host is running a BeanShell interpreter in remote server
mode. This allows network clients to connect to the interpreter and
execute BeanShell commands and arbitrary Java code. A remote,
unauthenticated attacker could exploit this to execute arbitrary
code.

See also :

http://www.beanshell.org/manual/remotemode.html

Solution :

Filter incoming traffic to this port or disable this service.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Gain a shell remotely

Nessus Plugin ID: 58975 ()

Bugtraq ID:

CVE ID: