An attacker can exploit this issue to bypass certain security restrictions by spoofing request headers allowing the attacker to perform malicious activities. Other attacks may also be possible.
Vendor Status:
Vendor issued an update for this vulnerablity.