Microsoft Windows Media Center MCL URL File Disclosure Exploit (MS15-134)

Windows Media Center MCL files can specify a URL to be automatically loaded within Media Center. A specially crafted MCL file can trick Windows Media Center into rendering the very same MCL file as a local HTML file within the application's embedded web browser. This can be leveraged by an attacker to read and exfiltrate arbitrary files from a victim's local fileystem by convincing an unsuspecting user to open an MCL file.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2015-6127
Product Version: 
2015_R1
Released Date: 
Tuesday, December 8, 2015 - 00:00