An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.
Vendor Status:
Currently we are not aware of any vendor-supplied patches