An attacker can leverage this issue to upload an arbitrary file and place it in an arbitrary location on the affected system. Successful exploits will compromise the affected application, and the underlying system.
Vendor Status:
Novell as issued an update for this vulnerablity.