Description of problem: When support was added for v4 signatures, it required that the client provide a X-Amz-Content-SHA256 header and use it in computing the expected signature. However, it wasn't verified that content sent actually matched the SHA! As a result, an attacker that manages to capture the headers for a PUT request had a 5-minute window to overwrite the object with arbitrary content of the same length. Because an attacker must already have to have secure access to exploit, this has been raised as a hardening task. Additional info: Upstream bug: https://bugs.launchpad.net/ossa/+bug/1765834, fixed in 2.21.0
This is resolved in OSP16.1 and OSP16.2. Since OSP13 retired on June 27, 2023, I am closing this.