BeanShell Remote Server Mode Arbitrary Code Execution

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

A shell is listening on the remote host.

Description :

The remote host is running a BeanShell interpreter in remote server
mode. This allows network clients to connect to the interpreter and
execute BeanShell commands and arbitrary Java code. A remote,
unauthenticated attacker could exploit this to execute arbitrary

See also :

Solution :

Filter incoming traffic to this port or disable this service.

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Gain a shell remotely

Nessus Plugin ID: 58975 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now