cPanel & WHM Version 114 has been released, and brings a slew of great updates. Take a look at what is included, and then upgrade today!

URL shortcuts like - ability to disable those ScriptAliasMatch directives

a289 shared this idea 8 years ago
Open Discussion

It would be nice to be able to disable cPanel's default URL shortcuts such as through the WHM or cPanel interface if it's not desired for those to be available to websites. Currently they have to be commented out in the httpd.conf file and then you run /usr/local/cpanel/bin/apache_conf_distiller --update, but when the conf gets rebuilt they get uncommented (or added back in if you had deleted them).

  1. ScriptAliasMatch ^/?controlpanel/?$ /usr/local/cpanel/cgi-sys/redirect.cgi
  2. ScriptAliasMatch ^/?cpanel/?$ /usr/local/cpanel/cgi-sys/redirect.cgi
  3. ScriptAliasMatch ^/?kpanel/?$ /usr/local/cpanel/cgi-sys/redirect.cgi
  4. ScriptAliasMatch ^/?securecontrolpanel/?$ /usr/local/cpanel/cgi-sys/sredirect.cgi
  5. ScriptAliasMatch ^/?securecpanel/?$ /usr/local/cpanel/cgi-sys/sredirect.cgi
  6. ScriptAliasMatch ^/?securewhm/?$ /usr/local/cpanel/cgi-sys/swhmredirect.cgi
  7. ScriptAliasMatch ^/?whm/?$ /usr/local/cpanel/cgi-sys/whmredirect.cgi
  8. ScriptAliasMatch ^/Autodiscover/Autodiscover.xml /usr/local/cpanel/cgi-sys/autodiscover.cgi
  9. ScriptAliasMatch ^/autodiscover/autodiscover.xml /usr/local/cpanel/cgi-sys/autodiscover.cgi
  10. ScriptAliasMatch ^/?webmail(/.*|/?)$ /usr/local/cpanel/cgi-sys/wredirect.cgi

Replies (4)


Hi let me know if you have added this feature?


This is important if you use Cloudflare. As such shortcuts are not behind Cloudflare and thus immediately reveal your true IP Address.

Having this option can actually improve security. Would like to see this as a per account setting


I believe there is already a feature request for this.


I searched the site for ScriptAliasMatch and this is the only feature request that came up. If you know of a different one can you post it here? Thanks


I found one, which I merged in. There is an older one which I'm having difficulty locating at the moment.


This has become more important as some PCI scans flag /controlpanel as vulnerable to ClickJacking like:


Web Application Potentially Vulnerable to Clickjacking.


The remote web server may fail to mitigate a class of web application vulnerabilities.


The remote web server does not set an X-Frame-Options response header in all content responses. This could potentially expose the site to a clickjacking or UI Redress attack wherein an attacker can trick a user into clicking an area of the vulnerable page that is different than what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions. X-FrameOptions has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors. Note that while the XFrame-Options response header is not the only mitigation for clickjacking, it is currently the most reliable method to detect through automation. Therefore, this plugin may produce false positives if other mitigation strategies (e.g frame-busting JavaScript) are deployed or if the page does not perform any security-sensitive transactions. See also :


Return the X-Frame-Options HTTP header with the page's response. This prevents the page's content from being rendered by another site when using the frame or iframe HTML tags.

Data Received:

The following pages do not use an X-Frame-Options response header: http://domain.tld/controlpanel

Leave a Comment
Attach a file