The process of exploiting vulnerabilities is simple and clear. Weak passwords can be used to execute commands in the background, which is a straightforward sequence of actions.
Weak password for xxl-job: admin/123456
After logging in, the interface is as follows:
Find task management and select the external interface executor to bounce the shell:
Select the created task, choose operation-GLUE IDE:
Open the editor window, write the command, and save:
Go back to the task window and select execute once:
The server nc is listening and successfully obtains server permissions: