From c8e53d4b1bf4a3d4c16e0c848658c0c20168b23d Mon Sep 17 00:00:00 2001 From: kn32 <105210950+kn32@users.noreply.github.com> Date: Tue, 9 May 2023 23:36:32 +0100 Subject: [PATCH] Add link to code --- _posts/2023-04-02-parallels-escape.markdown | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_posts/2023-04-02-parallels-escape.markdown b/_posts/2023-04-02-parallels-escape.markdown index 028d947..f0c15dd 100644 --- a/_posts/2023-04-02-parallels-escape.markdown +++ b/_posts/2023-04-02-parallels-escape.markdown @@ -189,7 +189,7 @@ This chain can be exploited from within any guest operating system by any code w Overall, Parallels is a fun target. Based on the bugs I and others have found I would say that it's more immature than the likes of VirtualBox and VMWare, and I'm sure there are plenty more bugs to be found here. - +You can find the code for these exploits [on my GitHub](https://github.com/kn32/parallels-plist-escape){:target="_blank"}. ## Timeline - Plist injection - Assigned CVE-2023-27328 / [ZDI-23-220](https://www.zerodayinitiative.com/advisories/ZDI-23-220/)