vendor:
Windows Media Center
by:
hyp3rlinx
CVSS
HIGH
XML External Entity MotW Bypass (Anniversary Edition)
611
CWE
Product Name: Windows Media Center
Affected Version From: Windows XP Media Center
Affected Version To: Windows 7
Patch Exists: NO
Related CWE: N/A
CPE: o:microsoft:windows_xp_media_center
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 7
2019
Microsoft Windows Media Center 2002 – XML External Entity MotW Bypass
This vulnerability was originally released by me back on December 4, 2016, yet remains unfixed. Now, to make matters worse I will let you know "mark-of-the-web" MotW does not matter here, its just ignored. Meaning, if the .MCL file is internet downloaded it gets the MOTW but files still exfiltrated. Host the "FindMeThatBiotch.dtd" DTD file in the web-root of the attacker server Port 80 etc... Download the ".mcl" file using Microsoft Internet Explorer. Check the MotW where you downloaded the .MCL file dir /r and note the Zone.Identifier:$DATA exists. Open the file and BOOM! watch shitz leaving!... still vulnerable after all these years lol.
Mitigation:
Microsoft has not released any patch for this vulnerability.