Apache cassandra is vulnerable to remote code execution. The vulnerability exists due to the use of a default JMX configuration of unauthenticated JMX/RMI interface to all network interfaces. Therefore, anyone with access to the interface is allowed to listen to the RMI and to trigger a remote execution of serialized Java.
packetstormsecurity.com/files/131249/Apache-Cassandra-Remote-Code-Execution.html
rhn.redhat.com/errata/RHSA-2015-1947.html
www.mail-archive.com/[email protected]/msg41819.html
www.securityfocus.com/archive/1/535154/100/0/threaded
www.securityfocus.com/bid/73478
www.securitytracker.com/id/1034002
bugzilla.redhat.com/show_bug.cgi?id=1208181