BeanShell Remote Server Mode Arbitrary Code Execution

This script is Copyright (C) 2012 Tenable Network Security, Inc.

Synopsis :

A shell is listening on the remote host.

Description :

The remote host is running a BeanShell interpreter in remote server
mode. This allows network clients to connect to the interpreter and
execute BeanShell commands and arbitrary Java code. A remote,
unauthenticated attacker could exploit this to execute arbitrary

See also :

Solution :

Filter incoming traffic to this port or disable this service.

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Gain a shell remotely

Nessus Plugin ID: 58975 ()

Bugtraq ID:


Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial