Description
In the default configuration, after JBoss is installed, the JMX console is available at http://localhost:8080/jmx-console. The JMX console can be used to display the JNDI tree, dump the list of threads, redeploy an application or even shutdown the application server. By default, the console is not secured and can be used by remote attackers. Check References for detailed information.
It's possible to access the BSHDeployer MBean. The BSHDeployer MBean allows the deployment of BeanShell scripts. They are automatically executed once after installation.
Remediation
Restrict access to JMX Management Console.
References
Related Vulnerabilities
[Possible] Internal Path Disclosure (*nix)
WordPress 4.5.x Multiple Vulnerabilities (4.5 - 4.5.15)
WordPress Plugin Gallery by BestWebSoft Arbitrary File Disclosure (3.8.3)
Unrestricted access to NGINX+ API interface (read only)
Roundcube Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5382)