The process of exploiting vulnerabilities is simple and clear, using weak passwords to execute commands in the background, which belongs to a sequence that can be done with hands-on.
Weak password for xxl-job: admin/123456
After logging in, the interface is as follows:
Find task management and select the external interface executor to bounce the shell.
Select the created task, choose operation-GLUE IDE.
Open the editor window, write the command, and save.
Go back to the task window, select execute once.
The server nc is listening and successfully obtains server permissions.