Description
In the default configuration, after JBoss is installed, the JMX console is available at http://localhost:8080/jmx-console. The JMX console can be used to display the JNDI tree, dump the list of threads, redeploy an application or even shutdown the application server. By default, the console is not secured and can be used by remote attackers. Check References for detailed information.
It's possible to access the BSHDeployer MBean. The BSHDeployer MBean allows the deployment of BeanShell scripts. They are automatically executed once after installation.
Remediation
Restrict access to JMX Management Console.
References
Related Vulnerabilities
WordPress Plugin SP Project & Document Manager Multiple Vulnerabilities (2.5.9.7)
WordPress Plugin Gmail SMTP Arbitrary File Disclosure (1.1.0)
Apache Axis2 xsd local file inclusion
WordPress Plugin WooCommerce Arbitrary File Download (3.4.5)
Roundcube Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5383)