I'm building a web app that uses S3. In some of our operations, we're creating a file on S3 with a path that's directly dependent on user input, so an attacker might cause a file to be created on S3 with whichever path he wants.
Is there a way for an attacker to leverage this into an attack? (A few ideas that came to mind were using magic file names, or feeding very long paths, but if you have other ideas I'll be happy to hear them.)
If there's a serious possibility for a vulnerability, we'll consider redesigning the system.