Textpattern CMS 'index.php' Remote File Inclusion Vulnerability

Summary
This host is running Textpattern and is prone to remote file inclusion vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary code on the vulnerable Web server. Impact Level: Application.
Solution
Upgrade to version 4.3.0 or later, For updates refer to http://textpattern.com/download
Insight
The flaw is due to an error in 'index.php', which is not properly sanitizing user-supplied data via 'inc' parameter. This allows an attacker to include arbitrary files.
Affected
Textpattern CMS version 4.2.0
References