BeanShell Remote Server Mode Arbitrary Code Execution
Critical Nessus Plugin ID 58975
SynopsisA shell is listening on the remote host.
DescriptionThe remote host is running a BeanShell interpreter in remote server mode. This allows network clients to connect to the interpreter and execute BeanShell commands and arbitrary Java code. A remote, unauthenticated attacker could exploit this to execute arbitrary code.
SolutionFilter incoming traffic to this port or disable this service.