An authenticated attacker that has privileges to modify the data source configurations can read arbitrary files.
{ "custom_ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "6.4.4" } ], "type": "ECOSYSTEM" } ] }