I'm using Ghidra to reverse engineer a particular application called Mirth (v4.4.1) which had a command injection vulnerability. I have the reference which tells me the problematic part of the code. The challenge I face is, when I push the Mirth exe file (supposed to be built with java) on Ghidra, it shows up as a C++ construction apart from the assembly language. I'm trying to locate that exact code in the exe file which I can make an anatomy on. Can you tell me how can I do this? I'm stuck because of translation.
One point I found out is that, I somehow need to push the jar file instead of the exe, but I have just the exe file.