It's possible to access any external file by using it as a table storage.
vulners.com/securityvulns/securityvulns:doc:4356