The install function in Firefox 1.0.3 allows remote web sites on the browser's whitelist, such as update.mozilla.org or addon.mozilla.org, to execute arbitrary Javascript with chrome privileges, leading to arbitrary code execution on the system when combined with vulnerabilities such as CVE-2005-1476, as demonstrated using a javascript: URL as the package icon and a cross-site scripting (XSS) attack on a vulnerable whitelist site.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9231
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100001
https://exchange.xforce.ibmcloud.com/vulnerabilities/20443
https://bugzilla.mozilla.org/show_bug.cgi?id=293302
https://bugzilla.mozilla.org/show_bug.cgi?id=292691
http://www.vupen.com/english/advisories/2005/0493
http://www.securityfocus.com/bid/15495
http://www.securityfocus.com/bid/13544
http://www.redhat.com/support/errata/RHSA-2005-435.html
http://www.redhat.com/support/errata/RHSA-2005-434.html
http://www.mozilla.org/security/announce/mfsa2005-42.html
http://www.kb.cert.org/vuls/id/648758
http://securitytracker.com/id?1013913
http://secunia.com/advisories/15292