Because the BROWSER is what's being attacked in a MiTM. To the server it just looks like a regular client connecting. It never sees the certificate the client saw. There is nothing for the server to reject.
1. Attacker steals the private key via heartbleed or other means
2. Attacker sets up their own server using the stolen private key
3. Attacker tricks a user into accessing their server rather than the real server via any of a number of methods, such as a compromised hotspot.
4. User provides their sensitive information to the attacker, thinking they're on the real site.
No server-side action can mitigate the risk of a stolen private key in the above scenario, since the user never communicates with the legitimate server. That said, most browsers ship with certificate revocation lists disabled by default, so revoking the certificate doesn't help nearly as many people as we'd like. But for people who do enable CRLs, they'll see the scary warning rather than their browser trusting the revoked cert.