An attacker can leverage this issue to upload an arbitrary file and place it in an arbitrary location on the affected system. Successful exploits will compromise the affected application, and the underlying system.
Vendor Status:
Vendor as issued an updated vulnerability.