Description
In the default configuration, after JBoss is installed, the JMX console is available at http://localhost:8080/jmx-console. The JMX console can be used to display the JNDI tree, dump the list of threads, redeploy an application or even shutdown the application server. By default, the console is not secured and can be used by remote attackers. Check References for detailed information.
It's possible to access the ServerInfo MBean that will disclose sensitive information. This information could be useful for an attacker.
Remediation
Restrict access to JMX Management Console.
References
Related Vulnerabilities
Joomla! Core 4.2.0 Information Disclosure (4.2.0)
WordPress Plugin Backup & Restore Dropbox Multiple Vulnerabilities (1.4.7.5)
Version Disclosure (ASP.NET MVC)
XOOPS Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3822)
WordPress Plugin Gutenberg Template Library & Redux Framework Multiple Vulnerabilities (4.2.11)