Cloud Access Manager is not affected by this vulnerability.
From the article it appears that only PHP apps are affected:
“Since the vulnerability affected the code for handling file uploads for PHP apps, other server-side implementations should be considered safe.”
Cloud Access Manager does not use any PHP code.
Also, the article states that the issue only affects Apache Web Server, Cloud Access Manager uses Tomcat for the proxy.
“The flaw stems from a change to the Apache web server, from version 2.3.9 and onwards, that disabled support for .htaccess security configuration files, which left projects like jQuery File Upload open to exploitation.”