Jolokia contains an unauthenticated version disclosure vulnerability.
Jolokia is an agent based approach for remote JMX access. It is an alternative to standard JSR 160 connectors. The communication between client and agent goes over HTTP (either GET or POST), where the request and response payload is represented in JSON. An attacker may identify a version disclosure in the target Jolokia web server's HTTP response.
An attacker might use the disclosed information to harvest specific security vulnerabilities for the version identified.
Restrict access to the /jolokia path on the web server where Jolokia is deployed.