Submitted by deadrxsezzz
Any user could steal any approved tOLP to Magnetar. This is because within the Magnetar call, if the user has not minted a tOLP NFT, they can participate with any id they wish, by inputting it in participateData.
The only thing to consider is that the following line, must not revert:
Since the contract will not be an owner of tOLPTokenId, well need to input a custom malicious lockDataTarget address, for which the approve will not revert. The lockDataTarget is not used at any other place within that function, so therell be no problem inputting a malicious address here.
After doing the described steps above, the attacker will lock the innocent users tOLP and get the oTAP NFT minted to themselves, effectively stealing the innocent users NFT.
Verify that the sender owns that tOLP id.
ERC721
0xWeiss (Tapioca) confirmed
